Merge pull request #54174 from thockin/gcr-vanity

Automatic merge from submit-queue (batch tested with PRs 54379, 56593, 56685, 54174, 57309). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Use k8s.gcr.io vanity domain for container images

Related issue: https://github.com/kubernetes/release/issues/281

```release-note
Use "k8s.gcr.io" for container images rather than "gcr.io/google_containers".  This is just a redirect, for now, so should not impact anyone materially.  

Documentation and tools should all convert to the new name. Users should take note of this in case they see this new name in the system.
```
This commit is contained in:
Kubernetes Submit Queue
2017-12-18 14:45:45 -08:00
committed by GitHub
245 changed files with 505 additions and 489 deletions

View File

@@ -177,15 +177,15 @@ filename | sha256 hash
### Other notable changes ### Other notable changes
* kube-apiserver now drops unneeded path information if an older version of Windows kubectl sends it. ([#44586](https://github.com/kubernetes/kubernetes/pull/44586), [@mml](https://github.com/mml)) * kube-apiserver now drops unneeded path information if an older version of Windows kubectl sends it. ([#44586](https://github.com/kubernetes/kubernetes/pull/44586), [@mml](https://github.com/mml))
* Bump gcr.io/google_containers/glbc from 0.8.0 to 0.9.2. Release notes: [0.9.0](https://github.com/kubernetes/ingress/releases/tag/0.9.0), [0.9.1](https://github.com/kubernetes/ingress/releases/tag/0.9.1), [0.9.2](https://github.com/kubernetes/ingress/releases/tag/0.9.2) ([#43098](https://github.com/kubernetes/kubernetes/pull/43098), [@timstclair](https://github.com/timstclair)) * Bump k8s.gcr.io/glbc from 0.8.0 to 0.9.2. Release notes: [0.9.0](https://github.com/kubernetes/ingress/releases/tag/0.9.0), [0.9.1](https://github.com/kubernetes/ingress/releases/tag/0.9.1), [0.9.2](https://github.com/kubernetes/ingress/releases/tag/0.9.2) ([#43098](https://github.com/kubernetes/kubernetes/pull/43098), [@timstclair](https://github.com/timstclair))
* Patch CVE-2016-8859 in alpine based images: ([#42937](https://github.com/kubernetes/kubernetes/pull/42937), [@timstclair](https://github.com/timstclair)) * Patch CVE-2016-8859 in alpine based images: ([#42937](https://github.com/kubernetes/kubernetes/pull/42937), [@timstclair](https://github.com/timstclair))
* - gcr.io/google-containers/etcd-empty-dir-cleanup * - k8s.gcr.io/etcd-empty-dir-cleanup
* - gcr.io/google-containers/kube-dnsmasq-amd64 * - k8s.gcr.io/kube-dnsmasq-amd64
* Check if pathExists before performing Unmount ([#39311](https://github.com/kubernetes/kubernetes/pull/39311), [@rkouj](https://github.com/rkouj)) * Check if pathExists before performing Unmount ([#39311](https://github.com/kubernetes/kubernetes/pull/39311), [@rkouj](https://github.com/rkouj))
* Unmount operation should not fail if volume is already unmounted ([#38547](https://github.com/kubernetes/kubernetes/pull/38547), [@rkouj](https://github.com/rkouj)) * Unmount operation should not fail if volume is already unmounted ([#38547](https://github.com/kubernetes/kubernetes/pull/38547), [@rkouj](https://github.com/rkouj))
* Updates base image used for `kube-addon-manager` to latest `python:2.7-slim` and embedded `kubectl` to `v1.3.10`. No functionality changes expected. ([#42842](https://github.com/kubernetes/kubernetes/pull/42842), [@ixdy](https://github.com/ixdy)) * Updates base image used for `kube-addon-manager` to latest `python:2.7-slim` and embedded `kubectl` to `v1.3.10`. No functionality changes expected. ([#42842](https://github.com/kubernetes/kubernetes/pull/42842), [@ixdy](https://github.com/ixdy))
* list-resources: don't fail if the grep fails to match any resources ([#41933](https://github.com/kubernetes/kubernetes/pull/41933), [@ixdy](https://github.com/ixdy)) * list-resources: don't fail if the grep fails to match any resources ([#41933](https://github.com/kubernetes/kubernetes/pull/41933), [@ixdy](https://github.com/ixdy))
* Update gcr.io/google-containers/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy)) * Update k8s.gcr.io/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
* Backporting TPR fix to 1.4 ([#42380](https://github.com/kubernetes/kubernetes/pull/42380), [@foxish](https://github.com/foxish)) * Backporting TPR fix to 1.4 ([#42380](https://github.com/kubernetes/kubernetes/pull/42380), [@foxish](https://github.com/foxish))
* Fix AWS device allocator to only use valid device names ([#41455](https://github.com/kubernetes/kubernetes/pull/41455), [@gnufied](https://github.com/gnufied)) * Fix AWS device allocator to only use valid device names ([#41455](https://github.com/kubernetes/kubernetes/pull/41455), [@gnufied](https://github.com/gnufied))
* Reverts to looking up the current VM in vSphere using the machine's UUID, either obtained via sysfs or via the `vm-uuid` parameter in the cloud configuration file. ([#40892](https://github.com/kubernetes/kubernetes/pull/40892), [@robdaemon](https://github.com/robdaemon)) * Reverts to looking up the current VM in vSphere using the machine's UUID, either obtained via sysfs or via the `vm-uuid` parameter in the cloud configuration file. ([#40892](https://github.com/kubernetes/kubernetes/pull/40892), [@robdaemon](https://github.com/robdaemon))

View File

@@ -249,18 +249,18 @@ filename | sha256 hash
* kube-up (with gce/gci and gce/coreos providers) now ensures the authentication token file contains correct tokens for the control plane components, even if the file already exists (ensures upgrades and downgrades work successfully) ([#43676](https://github.com/kubernetes/kubernetes/pull/43676), [@liggitt](https://github.com/liggitt)) * kube-up (with gce/gci and gce/coreos providers) now ensures the authentication token file contains correct tokens for the control plane components, even if the file already exists (ensures upgrades and downgrades work successfully) ([#43676](https://github.com/kubernetes/kubernetes/pull/43676), [@liggitt](https://github.com/liggitt))
* Patch CVE-2016-8859 in alpine based images: ([#42936](https://github.com/kubernetes/kubernetes/pull/42936), [@timstclair](https://github.com/timstclair)) * Patch CVE-2016-8859 in alpine based images: ([#42936](https://github.com/kubernetes/kubernetes/pull/42936), [@timstclair](https://github.com/timstclair))
* - gcr.io/google-containers/cluster-proportional-autoscaler-amd64 * - k8s.gcr.io/cluster-proportional-autoscaler-amd64
* - gcr.io/google-containers/dnsmasq-metrics-amd64 * - k8s.gcr.io/dnsmasq-metrics-amd64
* - gcr.io/google-containers/etcd-empty-dir-cleanup * - k8s.gcr.io/etcd-empty-dir-cleanup
* - gcr.io/google-containers/kube-addon-manager * - k8s.gcr.io/kube-addon-manager
* - gcr.io/google-containers/kube-dnsmasq-amd64 * - k8s.gcr.io/kube-dnsmasq-amd64
* - Disable thin_ls due to excessive iops ([#43113](https://github.com/kubernetes/kubernetes/pull/43113), [@dashpole](https://github.com/dashpole)) * - Disable thin_ls due to excessive iops ([#43113](https://github.com/kubernetes/kubernetes/pull/43113), [@dashpole](https://github.com/dashpole))
* - Ignore .mount cgroups, fixing dissappearing stats * - Ignore .mount cgroups, fixing dissappearing stats
* - Fix wc goroutine leak * - Fix wc goroutine leak
* - Update aws-sdk-go dependency to 1.6.10 * - Update aws-sdk-go dependency to 1.6.10
* PodSecurityPolicy authorization is correctly enforced by the PodSecurityPolicy admission plugin. ([#43489](https://github.com/kubernetes/kubernetes/pull/43489), [@liggitt](https://github.com/liggitt)) * PodSecurityPolicy authorization is correctly enforced by the PodSecurityPolicy admission plugin. ([#43489](https://github.com/kubernetes/kubernetes/pull/43489), [@liggitt](https://github.com/liggitt))
* Bump gcr.io/google_containers/glbc from 0.9.1 to 0.9.2. Release notes: [0.9.2](https://github.com/kubernetes/ingress/releases/tag/0.9.2) ([#43097](https://github.com/kubernetes/kubernetes/pull/43097), [@timstclair](https://github.com/timstclair)) * Bump k8s.gcr.io/glbc from 0.9.1 to 0.9.2. Release notes: [0.9.2](https://github.com/kubernetes/ingress/releases/tag/0.9.2) ([#43097](https://github.com/kubernetes/kubernetes/pull/43097), [@timstclair](https://github.com/timstclair))
* Update gcr.io/google-containers/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy)) * Update k8s.gcr.io/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
* restored normalization of custom `--etcd-prefix` when `--storage-backend` is set to etcd3 ([#42506](https://github.com/kubernetes/kubernetes/pull/42506), [@liggitt](https://github.com/liggitt)) * restored normalization of custom `--etcd-prefix` when `--storage-backend` is set to etcd3 ([#42506](https://github.com/kubernetes/kubernetes/pull/42506), [@liggitt](https://github.com/liggitt))
@@ -655,7 +655,7 @@ Features for this release were tracked via the use of the [kubernetes/features](
- [alpha] Introducing the v1alpha1 CRI API to allow pluggable container runtimes; an experimental docker-CRI integration is ready for testing and feedback. ([docs](https://github.com/kubernetes/community/blob/master/contributors/devel/container-runtime-interface.md)) ([kubernetes/features#54](https://github.com/kubernetes/features/issues/54)) - [alpha] Introducing the v1alpha1 CRI API to allow pluggable container runtimes; an experimental docker-CRI integration is ready for testing and feedback. ([docs](https://github.com/kubernetes/community/blob/master/contributors/devel/container-runtime-interface.md)) ([kubernetes/features#54](https://github.com/kubernetes/features/issues/54))
- [alpha] Kubelet launches container in a per pod cgroup hierarchy based on quality of service tier ([kubernetes/features#126](https://github.com/kubernetes/features/issues/126)) - [alpha] Kubelet launches container in a per pod cgroup hierarchy based on quality of service tier ([kubernetes/features#126](https://github.com/kubernetes/features/issues/126))
- [beta] Kubelet integrates with memcg notification API to detect when a hard eviction threshold is crossed ([kubernetes/features#125](https://github.com/kubernetes/features/issues/125)) - [beta] Kubelet integrates with memcg notification API to detect when a hard eviction threshold is crossed ([kubernetes/features#125](https://github.com/kubernetes/features/issues/125))
- [beta] Introducing the beta version containerized node conformance test gcr.io/google_containers/node-test:0.2 for users to verify node setup. ([docs](http://kubernetes.io/docs/admin/node-conformance/)) ([kubernetes/features#84](https://github.com/kubernetes/features/issues/84)) - [beta] Introducing the beta version containerized node conformance test k8s.gcr.io/node-test:0.2 for users to verify node setup. ([docs](http://kubernetes.io/docs/admin/node-conformance/)) ([kubernetes/features#84](https://github.com/kubernetes/features/issues/84))
- **Scheduling** - **Scheduling**
- [alpha] Added support for accounting opaque integer resources. ([docs](http://kubernetes.io/docs/user-guide/compute-resources/#opaque-integer-resources-alpha-feature)) ([kubernetes/features#76](https://github.com/kubernetes/features/issues/76)) - [alpha] Added support for accounting opaque integer resources. ([docs](http://kubernetes.io/docs/user-guide/compute-resources/#opaque-integer-resources-alpha-feature)) ([kubernetes/features#76](https://github.com/kubernetes/features/issues/76))
- [beta] PodDisruptionBudget has been promoted to beta, can be used to safely drain nodes while respecting application SLO's ([docs](http://kubernetes.io/docs/tasks/administer-cluster/safely-drain-node/)) ([kubernetes/features#85](https://github.com/kubernetes/features/issues/85)) - [beta] PodDisruptionBudget has been promoted to beta, can be used to safely drain nodes while respecting application SLO's ([docs](http://kubernetes.io/docs/tasks/administer-cluster/safely-drain-node/)) ([kubernetes/features#85](https://github.com/kubernetes/features/issues/85))

View File

@@ -1935,7 +1935,7 @@ Features for this release were tracked via the use of the [kubernetes/features](
* Fixes a bug in the OpenStack-Heat kubernetes provider, in the handling of differences between the Identity v2 and Identity v3 APIs ([#40105](https://github.com/kubernetes/kubernetes/pull/40105), [@sc68cal](https://github.com/sc68cal)) * Fixes a bug in the OpenStack-Heat kubernetes provider, in the handling of differences between the Identity v2 and Identity v3 APIs ([#40105](https://github.com/kubernetes/kubernetes/pull/40105), [@sc68cal](https://github.com/sc68cal))
### Container Images ### Container Images
* Update gcr.io/google-containers/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy)) * Update k8s.gcr.io/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
* Remove unnecessary metrics (http/process/go) from being exposed by etcd-version-monitor ([#41807](https://github.com/kubernetes/kubernetes/pull/41807), [@shyamjvs](https://github.com/shyamjvs)) * Remove unnecessary metrics (http/process/go) from being exposed by etcd-version-monitor ([#41807](https://github.com/kubernetes/kubernetes/pull/41807), [@shyamjvs](https://github.com/shyamjvs))
* Align the hyperkube image to support running binaries at /usr/local/bin/ like the other server images ([#41017](https://github.com/kubernetes/kubernetes/pull/41017), [@luxas](https://github.com/luxas)) * Align the hyperkube image to support running binaries at /usr/local/bin/ like the other server images ([#41017](https://github.com/kubernetes/kubernetes/pull/41017), [@luxas](https://github.com/luxas))
* Bump up GLBC version from 0.9.0-beta to 0.9.1 ([#41037](https://github.com/kubernetes/kubernetes/pull/41037), [@bprashanth](https://github.com/bprashanth)) * Bump up GLBC version from 0.9.0-beta to 0.9.1 ([#41037](https://github.com/kubernetes/kubernetes/pull/41037), [@bprashanth](https://github.com/bprashanth))
@@ -1982,7 +1982,7 @@ Features for this release were tracked via the use of the [kubernetes/features](
* Use kube-dns:1.11.0 ([#39925](https://github.com/kubernetes/kubernetes/pull/39925), [@sadlil](https://github.com/sadlil)) * Use kube-dns:1.11.0 ([#39925](https://github.com/kubernetes/kubernetes/pull/39925), [@sadlil](https://github.com/sadlil))
### DNS Autoscaler ### DNS Autoscaler
* Patch CVE-2016-8859 in gcr.io/google-containers/cluster-proportional-autoscaler-amd64 ([#42933](https://github.com/kubernetes/kubernetes/pull/42933), [@timstclair](https://github.com/timstclair)) * Patch CVE-2016-8859 in k8s.gcr.io/cluster-proportional-autoscaler-amd64 ([#42933](https://github.com/kubernetes/kubernetes/pull/42933), [@timstclair](https://github.com/timstclair))
### Cluster Autoscaler ### Cluster Autoscaler
* Allow the Horizontal Pod Autoscaler controller to talk to the metrics API and custom metrics API as standard APIs. ([#41824](https://github.com/kubernetes/kubernetes/pull/41824), [@DirectXMan12](https://github.com/DirectXMan12)) * Allow the Horizontal Pod Autoscaler controller to talk to the metrics API and custom metrics API as standard APIs. ([#41824](https://github.com/kubernetes/kubernetes/pull/41824), [@DirectXMan12](https://github.com/DirectXMan12))
@@ -2149,7 +2149,7 @@ filename | sha256 hash
* Rescheduler uses taints in v1beta1 and will remove old ones (in version v1alpha1) right after its start. ([#43106](https://github.com/kubernetes/kubernetes/pull/43106), [@piosz](https://github.com/piosz)) * Rescheduler uses taints in v1beta1 and will remove old ones (in version v1alpha1) right after its start. ([#43106](https://github.com/kubernetes/kubernetes/pull/43106), [@piosz](https://github.com/piosz))
* kubeadm: `kubeadm reset` won't drain and remove the current node anymore ([#42713](https://github.com/kubernetes/kubernetes/pull/42713), [@luxas](https://github.com/luxas)) * kubeadm: `kubeadm reset` won't drain and remove the current node anymore ([#42713](https://github.com/kubernetes/kubernetes/pull/42713), [@luxas](https://github.com/luxas))
* hack/godep-restore.sh: use godep v79 which works ([#42965](https://github.com/kubernetes/kubernetes/pull/42965), [@sttts](https://github.com/sttts)) * hack/godep-restore.sh: use godep v79 which works ([#42965](https://github.com/kubernetes/kubernetes/pull/42965), [@sttts](https://github.com/sttts))
* Patch CVE-2016-8859 in gcr.io/google-containers/cluster-proportional-autoscaler-amd64 ([#42933](https://github.com/kubernetes/kubernetes/pull/42933), [@timstclair](https://github.com/timstclair)) * Patch CVE-2016-8859 in k8s.gcr.io/cluster-proportional-autoscaler-amd64 ([#42933](https://github.com/kubernetes/kubernetes/pull/42933), [@timstclair](https://github.com/timstclair))
* Disable devicemapper thin_ls due to excessive iops ([#42899](https://github.com/kubernetes/kubernetes/pull/42899), [@dashpole](https://github.com/dashpole)) * Disable devicemapper thin_ls due to excessive iops ([#42899](https://github.com/kubernetes/kubernetes/pull/42899), [@dashpole](https://github.com/dashpole))
@@ -2383,7 +2383,7 @@ filename | sha256 hash
* Add configurable limits to CronJob resource to specify how many successful and failed jobs are preserved. ([#40932](https://github.com/kubernetes/kubernetes/pull/40932), [@peay](https://github.com/peay)) * Add configurable limits to CronJob resource to specify how many successful and failed jobs are preserved. ([#40932](https://github.com/kubernetes/kubernetes/pull/40932), [@peay](https://github.com/peay))
* Deprecate outofdisk-transition-frequency and low-diskspace-threshold-mb flags ([#41941](https://github.com/kubernetes/kubernetes/pull/41941), [@dashpole](https://github.com/dashpole)) * Deprecate outofdisk-transition-frequency and low-diskspace-threshold-mb flags ([#41941](https://github.com/kubernetes/kubernetes/pull/41941), [@dashpole](https://github.com/dashpole))
* Add OWNERS for sample-apiserver in staging ([#42094](https://github.com/kubernetes/kubernetes/pull/42094), [@sttts](https://github.com/sttts)) * Add OWNERS for sample-apiserver in staging ([#42094](https://github.com/kubernetes/kubernetes/pull/42094), [@sttts](https://github.com/sttts))
* Update gcr.io/google-containers/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy)) * Update k8s.gcr.io/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
* Add storage.k8s.io/v1 API ([#40088](https://github.com/kubernetes/kubernetes/pull/40088), [@jsafrane](https://github.com/jsafrane)) * Add storage.k8s.io/v1 API ([#40088](https://github.com/kubernetes/kubernetes/pull/40088), [@jsafrane](https://github.com/jsafrane))
* Juju - K8s master charm now properly keeps distributed master files in sync for an HA control plane. ([#41351](https://github.com/kubernetes/kubernetes/pull/41351), [@chuckbutler](https://github.com/chuckbutler)) * Juju - K8s master charm now properly keeps distributed master files in sync for an HA control plane. ([#41351](https://github.com/kubernetes/kubernetes/pull/41351), [@chuckbutler](https://github.com/chuckbutler))
* Fix zsh completion: unknown file attribute error ([#38104](https://github.com/kubernetes/kubernetes/pull/38104), [@elipapa](https://github.com/elipapa)) * Fix zsh completion: unknown file attribute error ([#38104](https://github.com/kubernetes/kubernetes/pull/38104), [@elipapa](https://github.com/elipapa))

View File

@@ -75018,7 +75018,7 @@
], ],
"properties": { "properties": {
"names": { "names": {
"description": "Names by which this image is known. e.g. [\"gcr.io/google_containers/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]", "description": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]",
"type": "array", "type": "array",
"items": { "items": {
"type": "string" "type": "string"

View File

@@ -20257,7 +20257,7 @@
"items": { "items": {
"type": "string" "type": "string"
}, },
"description": "Names by which this image is known. e.g. [\"gcr.io/google_containers/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]" "description": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]"
}, },
"sizeBytes": { "sizeBytes": {
"type": "integer", "type": "integer",

View File

@@ -62,7 +62,11 @@ DOCKERIZED_BINARIES = {
[docker_bundle( [docker_bundle(
name = binary, name = binary,
images = {"gcr.io/google_containers/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal"}, # TODO(thockin): remove the google_containers name after release 1.10.
images = {
"k8s.gcr.io/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal",
"gcr.io/google_containers/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal",
},
stamp = True, stamp = True,
) for binary in DOCKERIZED_BINARIES.keys()] ) for binary in DOCKERIZED_BINARIES.keys()]

View File

@@ -13,7 +13,7 @@
# limitations under the License. # limitations under the License.
# This file creates a standard build environment for building Kubernetes # This file creates a standard build environment for building Kubernetes
FROM gcr.io/google_containers/kube-cross:KUBE_BUILD_IMAGE_CROSS_TAG FROM k8s.gcr.io/kube-cross:KUBE_BUILD_IMAGE_CROSS_TAG
# Mark this as a kube-build container # Mark this as a kube-build container
RUN touch /kube-build-image RUN touch /kube-build-image

View File

@@ -21,7 +21,7 @@ TAG=$(shell cat VERSION)
all: push all: push
build: build:
docker build --pull -t gcr.io/google_containers/$(IMAGE):$(TAG) . docker build --pull -t k8s.gcr.io/$(IMAGE):$(TAG) .
push: build push: build
gcloud docker --server=gcr.io -- push gcr.io/google_containers/$(IMAGE):$(TAG) gcloud docker -- push k8s.gcr.io/$(IMAGE):$(TAG)

View File

@@ -96,7 +96,7 @@ kube::build::get_docker_wrapped_binaries() {
kube-controller-manager,busybox kube-controller-manager,busybox
kube-scheduler,busybox kube-scheduler,busybox
kube-aggregator,busybox kube-aggregator,busybox
kube-proxy,gcr.io/google-containers/debian-iptables-amd64:${debian_iptables_version} kube-proxy,k8s.gcr.io/debian-iptables-amd64:${debian_iptables_version}
);; );;
"arm") "arm")
local targets=( local targets=(
@@ -105,7 +105,7 @@ kube::build::get_docker_wrapped_binaries() {
kube-controller-manager,arm32v7/busybox kube-controller-manager,arm32v7/busybox
kube-scheduler,arm32v7/busybox kube-scheduler,arm32v7/busybox
kube-aggregator,arm32v7/busybox kube-aggregator,arm32v7/busybox
kube-proxy,gcr.io/google-containers/debian-iptables-arm:${debian_iptables_version} kube-proxy,k8s.gcr.io/debian-iptables-arm:${debian_iptables_version}
);; );;
"arm64") "arm64")
local targets=( local targets=(
@@ -114,7 +114,7 @@ kube::build::get_docker_wrapped_binaries() {
kube-controller-manager,arm64v8/busybox kube-controller-manager,arm64v8/busybox
kube-scheduler,arm64v8/busybox kube-scheduler,arm64v8/busybox
kube-aggregator,arm64v8/busybox kube-aggregator,arm64v8/busybox
kube-proxy,gcr.io/google-containers/debian-iptables-arm64:${debian_iptables_version} kube-proxy,k8s.gcr.io/debian-iptables-arm64:${debian_iptables_version}
);; );;
"ppc64le") "ppc64le")
local targets=( local targets=(
@@ -123,7 +123,7 @@ kube::build::get_docker_wrapped_binaries() {
kube-controller-manager,ppc64le/busybox kube-controller-manager,ppc64le/busybox
kube-scheduler,ppc64le/busybox kube-scheduler,ppc64le/busybox
kube-aggregator,ppc64le/busybox kube-aggregator,ppc64le/busybox
kube-proxy,gcr.io/google-containers/debian-iptables-ppc64le:${debian_iptables_version} kube-proxy,k8s.gcr.io/debian-iptables-ppc64le:${debian_iptables_version}
);; );;
"s390x") "s390x")
local targets=( local targets=(
@@ -132,7 +132,7 @@ kube::build::get_docker_wrapped_binaries() {
kube-controller-manager,s390x/busybox kube-controller-manager,s390x/busybox
kube-scheduler,s390x/busybox kube-scheduler,s390x/busybox
kube-aggregator,s390x/busybox kube-aggregator,s390x/busybox
kube-proxy,gcr.io/google-containers/debian-iptables-s390x:${debian_iptables_version} kube-proxy,k8s.gcr.io/debian-iptables-s390x:${debian_iptables_version}
);; );;
esac esac

View File

@@ -14,7 +14,7 @@
all: build all: build
REGISTRY ?= gcr.io/google-containers REGISTRY ?= k8s.gcr.io
IMAGE ?= debian-base IMAGE ?= debian-base
BUILD_IMAGE ?= debian-build BUILD_IMAGE ?= debian-build

View File

@@ -15,15 +15,15 @@
# Build the hyperkube base image. This image is used to build the hyperkube image. # Build the hyperkube base image. This image is used to build the hyperkube image.
# #
# Usage: # Usage:
# [ARCH=amd64] [REGISTRY="gcr.io/google-containers"] make (build|push) # [ARCH=amd64] [REGISTRY="k8s.gcr.io"] make (build|push)
REGISTRY?=gcr.io/google-containers REGISTRY?=k8s.gcr.io
IMAGE?=debian-hyperkube-base IMAGE?=debian-hyperkube-base
TAG=0.8 TAG=0.8
ARCH?=amd64 ARCH?=amd64
CACHEBUST?=1 CACHEBUST?=1
BASEIMAGE=gcr.io/google-containers/debian-base-$(ARCH):0.3 BASEIMAGE=k8s.gcr.io/debian-base-$(ARCH):0.3
CNI_VERSION=v0.6.0 CNI_VERSION=v0.6.0
TEMP_DIR:=$(shell mktemp -d) TEMP_DIR:=$(shell mktemp -d)

View File

@@ -1,6 +1,6 @@
### debian-hyperkube-base ### debian-hyperkube-base
Serves as the base image for `gcr.io/google-containers/hyperkube-${ARCH}` Serves as the base image for `k8s.gcr.io/hyperkube-${ARCH}`
images. images.
This image is compiled for multiple architectures. This image is compiled for multiple architectures.
@@ -12,19 +12,19 @@ If you're editing the Dockerfile or some other thing, please bump the `TAG` in t
```console ```console
# Build for linux/amd64 (default) # Build for linux/amd64 (default)
$ make push ARCH=amd64 $ make push ARCH=amd64
# ---> gcr.io/google-containers/debian-hyperkube-base-amd64:TAG # ---> k8s.gcr.io/debian-hyperkube-base-amd64:TAG
$ make push ARCH=arm $ make push ARCH=arm
# ---> gcr.io/google-containers/debian-hyperkube-base-arm:TAG # ---> k8s.gcr.io/debian-hyperkube-base-arm:TAG
$ make push ARCH=arm64 $ make push ARCH=arm64
# ---> gcr.io/google-containers/debian-hyperkube-base-arm64:TAG # ---> k8s.gcr.io/debian-hyperkube-base-arm64:TAG
$ make push ARCH=ppc64le $ make push ARCH=ppc64le
# ---> gcr.io/google-containers/debian-hyperkube-base-ppc64le:TAG # ---> k8s.gcr.io/debian-hyperkube-base-ppc64le:TAG
$ make push ARCH=s390x $ make push ARCH=s390x
# ---> gcr.io/google-containers/debian-hyperkube-base-s390x:TAG # ---> k8s.gcr.io/debian-hyperkube-base-s390x:TAG
``` ```
If you don't want to push the images, run `make build` instead If you don't want to push the images, run `make build` instead

View File

@@ -14,7 +14,7 @@
.PHONY: build push .PHONY: build push
REGISTRY?="gcr.io/google-containers" REGISTRY?="k8s.gcr.io"
IMAGE=debian-iptables IMAGE=debian-iptables
TAG=v10 TAG=v10
ARCH?=amd64 ARCH?=amd64
@@ -34,7 +34,7 @@ ifeq ($(ARCH),s390x)
QEMUARCH=s390x QEMUARCH=s390x
endif endif
BASEIMAGE=gcr.io/google-containers/debian-base-$(ARCH):0.3 BASEIMAGE=k8s.gcr.io/debian-base-$(ARCH):0.3
build: build:
cp ./* $(TEMP_DIR) cp ./* $(TEMP_DIR)

View File

@@ -1,6 +1,6 @@
### debian-iptables ### debian-iptables
Serves as the base image for `gcr.io/google_containers/kube-proxy-${ARCH}` and multiarch (not `amd64`) `gcr.io/google_containers/flannel-${ARCH}` images. Serves as the base image for `k8s.gcr.io/kube-proxy-${ARCH}` and multiarch (not `amd64`) `k8s.gcr.io/flannel-${ARCH}` images.
This image is compiled for multiple architectures. This image is compiled for multiple architectures.
@@ -11,19 +11,19 @@ If you're editing the Dockerfile or some other thing, please bump the `TAG` in t
```console ```console
# Build for linux/amd64 (default) # Build for linux/amd64 (default)
$ make push ARCH=amd64 $ make push ARCH=amd64
# ---> gcr.io/google_containers/debian-iptables-amd64:TAG # ---> k8s.gcr.io/debian-iptables-amd64:TAG
$ make push ARCH=arm $ make push ARCH=arm
# ---> gcr.io/google_containers/debian-iptables-arm:TAG # ---> k8s.gcr.io/debian-iptables-arm:TAG
$ make push ARCH=arm64 $ make push ARCH=arm64
# ---> gcr.io/google_containers/debian-iptables-arm64:TAG # ---> k8s.gcr.io/debian-iptables-arm64:TAG
$ make push ARCH=ppc64le $ make push ARCH=ppc64le
# ---> gcr.io/google_containers/debian-iptables-ppc64le:TAG # ---> k8s.gcr.io/debian-iptables-ppc64le:TAG
$ make push ARCH=s390x $ make push ARCH=s390x
# ---> gcr.io/google_containers/debian-iptables-s390x:TAG # ---> k8s.gcr.io/debian-iptables-s390x:TAG
``` ```
If you don't want to push the images, run `make` or `make build` instead If you don't want to push the images, run `make` or `make build` instead

View File

@@ -285,7 +285,11 @@ function kube::release::create_docker_images_for_server() {
local images_dir="${RELEASE_IMAGES}/${arch}" local images_dir="${RELEASE_IMAGES}/${arch}"
mkdir -p "${images_dir}" mkdir -p "${images_dir}"
local -r docker_registry="gcr.io/google_containers" local -r docker_registry="k8s.gcr.io"
# TODO(thockin): Remove all traces of this after 1.10 release.
# The following is the old non-indirected registry name. To ease the
# transition to the new name (above), we are double-tagging saved images.
local -r deprecated_registry="gcr.io/google_containers"
# Docker tags cannot contain '+' # Docker tags cannot contain '+'
local docker_tag="${KUBE_GIT_VERSION/+/_}" local docker_tag="${KUBE_GIT_VERSION/+/_}"
if [[ -z "${docker_tag}" ]]; then if [[ -z "${docker_tag}" ]]; then
@@ -306,14 +310,17 @@ function kube::release::create_docker_images_for_server() {
local docker_file_path="${docker_build_path}/Dockerfile" local docker_file_path="${docker_build_path}/Dockerfile"
local binary_file_path="${binary_dir}/${binary_name}" local binary_file_path="${binary_dir}/${binary_name}"
local docker_image_tag="${docker_registry}" local docker_image_tag="${docker_registry}"
local deprecated_image_tag="${deprecated_registry}"
if [[ ${arch} == "amd64" ]]; then if [[ ${arch} == "amd64" ]]; then
# If we are building a amd64 docker image, preserve the original # If we are building a amd64 docker image, preserve the original
# image name # image name
docker_image_tag+="/${binary_name}:${docker_tag}" docker_image_tag+="/${binary_name}:${docker_tag}"
deprecated_image_tag+="/${binary_name}:${docker_tag}"
else else
# If we are building a docker image for another architecture, # If we are building a docker image for another architecture,
# append the arch in the image tag # append the arch in the image tag
docker_image_tag+="/${binary_name}-${arch}:${docker_tag}" docker_image_tag+="/${binary_name}-${arch}:${docker_tag}"
deprecated_image_tag+="/${binary_name}-${arch}:${docker_tag}"
fi fi
@@ -325,7 +332,8 @@ function kube::release::create_docker_images_for_server() {
printf " FROM ${base_image} \n ADD ${binary_name} /usr/local/bin/${binary_name}\n" > ${docker_file_path} printf " FROM ${base_image} \n ADD ${binary_name} /usr/local/bin/${binary_name}\n" > ${docker_file_path}
"${DOCKER[@]}" build --pull -q -t "${docker_image_tag}" ${docker_build_path} >/dev/null "${DOCKER[@]}" build --pull -q -t "${docker_image_tag}" ${docker_build_path} >/dev/null
"${DOCKER[@]}" save "${docker_image_tag}" > "${binary_dir}/${binary_name}.tar" "${DOCKER[@]}" tag "${docker_image_tag}" ${deprecated_image_tag} >/dev/null
"${DOCKER[@]}" save "${docker_image_tag}" ${deprecated_image_tag} > "${binary_dir}/${binary_name}.tar"
echo "${docker_tag}" > ${binary_dir}/${binary_name}.docker_tag echo "${docker_tag}" > ${binary_dir}/${binary_name}.docker_tag
rm -rf ${docker_build_path} rm -rf ${docker_build_path}
ln "${binary_dir}/${binary_name}.tar" "${images_dir}/" ln "${binary_dir}/${binary_name}.tar" "${images_dir}/"
@@ -344,6 +352,7 @@ function kube::release::create_docker_images_for_server() {
# not a release # not a release
kube::log::status "Deleting docker image ${docker_image_tag}" kube::log::status "Deleting docker image ${docker_image_tag}"
"${DOCKER[@]}" rmi ${docker_image_tag} &>/dev/null || true "${DOCKER[@]}" rmi ${docker_image_tag} &>/dev/null || true
"${DOCKER[@]}" rmi ${deprecated_image_tag} &>/dev/null || true
fi fi
) & ) &
done done

View File

@@ -14,7 +14,7 @@
.PHONY: all push push-legacy container clean orphan .PHONY: all push push-legacy container clean orphan
REGISTRY ?= gcr.io/google_containers REGISTRY ?= k8s.gcr.io
IMAGE = $(REGISTRY)/pause-$(ARCH) IMAGE = $(REGISTRY)/pause-$(ARCH)
LEGACY_AMD64_IMAGE = $(REGISTRY)/pause LEGACY_AMD64_IMAGE = $(REGISTRY)/pause
@@ -26,7 +26,7 @@ ARCH ?= amd64
ALL_ARCH = amd64 arm arm64 ppc64le s390x ALL_ARCH = amd64 arm arm64 ppc64le s390x
CFLAGS = -Os -Wall -Werror -static CFLAGS = -Os -Wall -Werror -static
KUBE_CROSS_IMAGE ?= gcr.io/google_containers/kube-cross KUBE_CROSS_IMAGE ?= k8s.gcr.io/kube-cross
KUBE_CROSS_VERSION ?= $(shell cat ../build-image/cross/VERSION) KUBE_CROSS_VERSION ?= $(shell cat ../build-image/cross/VERSION)
BIN = pause BIN = pause

View File

@@ -81,16 +81,16 @@ http_file(
docker_pull( docker_pull(
name = "debian-iptables-amd64", name = "debian-iptables-amd64",
digest = "sha256:a3b936c0fb98a934eecd2cfb91f73658d402b29116084e778ce9ddb68e55383e", digest = "sha256:a3b936c0fb98a934eecd2cfb91f73658d402b29116084e778ce9ddb68e55383e",
registry = "gcr.io", registry = "k8s.gcr.io",
repository = "google-containers/debian-iptables-amd64", repository = "debian-iptables-amd64",
tag = "v10", # ignored, but kept here for documentation tag = "v10", # ignored, but kept here for documentation
) )
docker_pull( docker_pull(
name = "debian-hyperkube-base-amd64", name = "debian-hyperkube-base-amd64",
digest = "sha256:fc1b461367730660ac5a40c1eb2d1b23221829acf8a892981c12361383b3742b", digest = "sha256:fc1b461367730660ac5a40c1eb2d1b23221829acf8a892981c12361383b3742b",
registry = "gcr.io", registry = "k8s.gcr.io",
repository = "google-containers/debian-hyperkube-base-amd64", repository = "debian-hyperkube-base-amd64",
tag = "0.8", # ignored, but kept here for documentation tag = "0.8", # ignored, but kept here for documentation
) )

View File

@@ -12,7 +12,7 @@
# See the License for the specific language governing permissions and # See the License for the specific language governing permissions and
# limitations under the License. # limitations under the License.
IMAGE=gcr.io/google-containers/kube-addon-manager IMAGE=k8s.gcr.io/kube-addon-manager
ARCH?=amd64 ARCH?=amd64
TEMP_DIR:=$(shell mktemp -d) TEMP_DIR:=$(shell mktemp -d)
VERSION=v8.4 VERSION=v8.4

View File

@@ -40,20 +40,20 @@ The `addon-manager` is built for multiple architectures.
```console ```console
# Build for linux/amd64 (default) # Build for linux/amd64 (default)
$ make push ARCH=amd64 $ make push ARCH=amd64
# ---> gcr.io/google-containers/kube-addon-manager-amd64:VERSION # ---> k8s.gcr.io/kube-addon-manager-amd64:VERSION
# ---> gcr.io/google-containers/kube-addon-manager:VERSION (image with backwards-compatible naming) # ---> k8s.gcr.io/kube-addon-manager:VERSION (image with backwards-compatible naming)
$ make push ARCH=arm $ make push ARCH=arm
# ---> gcr.io/google-containers/kube-addon-manager-arm:VERSION # ---> k8s.gcr.io/kube-addon-manager-arm:VERSION
$ make push ARCH=arm64 $ make push ARCH=arm64
# ---> gcr.io/google-containers/kube-addon-manager-arm64:VERSION # ---> k8s.gcr.io/kube-addon-manager-arm64:VERSION
$ make push ARCH=ppc64le $ make push ARCH=ppc64le
# ---> gcr.io/google-containers/kube-addon-manager-ppc64le:VERSION # ---> k8s.gcr.io/kube-addon-manager-ppc64le:VERSION
$ make push ARCH=s390x $ make push ARCH=s390x
# ---> gcr.io/google-containers/kube-addon-manager-s390x:VERSION # ---> k8s.gcr.io/kube-addon-manager-s390x:VERSION
``` ```
If you don't want to push the images, run `make` or `make build` instead If you don't want to push the images, run `make` or `make build` instead

View File

@@ -17,7 +17,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: '' scheduler.alpha.kubernetes.io/critical-pod: ''
spec: spec:
containers: containers:
- image: gcr.io/google_containers/cpvpa-amd64:v0.6.0 - image: k8s.gcr.io/cpvpa-amd64:v0.6.0
name: autoscaler name: autoscaler
command: command:
- /cpvpa - /cpvpa

View File

@@ -17,7 +17,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: '' scheduler.alpha.kubernetes.io/critical-pod: ''
spec: spec:
containers: containers:
- image: gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2 - image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2
name: autoscaler name: autoscaler
command: command:
- /cluster-proportional-autoscaler - /cluster-proportional-autoscaler

View File

@@ -17,7 +17,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: '' scheduler.alpha.kubernetes.io/critical-pod: ''
spec: spec:
containers: containers:
- image: gcr.io/google_containers/cpvpa-amd64:v0.6.0 - image: k8s.gcr.io/cpvpa-amd64:v0.6.0
name: autoscaler name: autoscaler
command: command:
- /cpvpa - /cpvpa

View File

@@ -24,7 +24,7 @@ spec:
# Any image is permissible as long as: # Any image is permissible as long as:
# 1. It serves a 404 page at / # 1. It serves a 404 page at /
# 2. It serves 200 on a /healthz endpoint # 2. It serves 200 on a /healthz endpoint
image: gcr.io/google_containers/defaultbackend:1.3 image: k8s.gcr.io/defaultbackend:1.3
livenessProbe: livenessProbe:
httpGet: httpGet:
path: /healthz path: /healthz

View File

@@ -71,7 +71,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: '' scheduler.alpha.kubernetes.io/critical-pod: ''
spec: spec:
containers: containers:
- image: gcr.io/google_containers/heapster-amd64:v1.5.0 - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: heapster name: heapster
livenessProbe: livenessProbe:
httpGet: httpGet:
@@ -84,13 +84,13 @@ spec:
- /heapster - /heapster
- --source=kubernetes.summary_api:'' - --source=kubernetes.summary_api:''
- --sink=gcm - --sink=gcm
- image: gcr.io/google_containers/heapster-amd64:v1.5.0 - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: eventer name: eventer
command: command:
- /eventer - /eventer
- --source=kubernetes:'' - --source=kubernetes:''
- --sink=gcl - --sink=gcl
- image: gcr.io/google_containers/addon-resizer:1.8.1 - image: k8s.gcr.io/addon-resizer:1.8.1
name: heapster-nanny name: heapster-nanny
resources: resources:
limits: limits:
@@ -123,7 +123,7 @@ spec:
- --container=heapster - --container=heapster
- --poll-period=300000 - --poll-period=300000
- --estimator=exponential - --estimator=exponential
- image: gcr.io/google_containers/addon-resizer:1.8.1 - image: k8s.gcr.io/addon-resizer:1.8.1
name: eventer-nanny name: eventer-nanny
resources: resources:
limits: limits:

View File

@@ -71,8 +71,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: '' scheduler.alpha.kubernetes.io/critical-pod: ''
spec: spec:
containers: containers:
- image: gcr.io/google_containers/heapster-amd64:v1.5.0 - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: heapster name: heapster
livenessProbe: livenessProbe:
httpGet: httpGet:
@@ -86,13 +85,13 @@ spec:
- --source=kubernetes.summary_api:'' - --source=kubernetes.summary_api:''
- --sink=influxdb:http://monitoring-influxdb:8086 - --sink=influxdb:http://monitoring-influxdb:8086
- --sink=gcm:?metrics=autoscaling - --sink=gcm:?metrics=autoscaling
- image: gcr.io/google_containers/heapster-amd64:v1.5.0 - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: eventer name: eventer
command: command:
- /eventer - /eventer
- --source=kubernetes:'' - --source=kubernetes:''
- --sink=gcl - --sink=gcl
- image: gcr.io/google_containers/addon-resizer:1.8.1 - image: k8s.gcr.io/addon-resizer:1.8.1
name: heapster-nanny name: heapster-nanny
resources: resources:
limits: limits:
@@ -125,7 +124,7 @@ spec:
- --container=heapster - --container=heapster
- --poll-period=300000 - --poll-period=300000
- --estimator=exponential - --estimator=exponential
- image: gcr.io/google_containers/addon-resizer:1.8.1 - image: k8s.gcr.io/addon-resizer:1.8.1
name: eventer-nanny name: eventer-nanny
resources: resources:
limits: limits:

View File

@@ -71,7 +71,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: '' scheduler.alpha.kubernetes.io/critical-pod: ''
spec: spec:
containers: containers:
- image: gcr.io/google_containers/heapster-amd64:v1.5.0 - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: heapster name: heapster
livenessProbe: livenessProbe:
httpGet: httpGet:
@@ -84,13 +84,13 @@ spec:
- /heapster - /heapster
- --source=kubernetes.summary_api:'' - --source=kubernetes.summary_api:''
- --sink=influxdb:http://monitoring-influxdb:8086 - --sink=influxdb:http://monitoring-influxdb:8086
- image: gcr.io/google_containers/heapster-amd64:v1.5.0 - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: eventer name: eventer
command: command:
- /eventer - /eventer
- --source=kubernetes:'' - --source=kubernetes:''
- --sink=influxdb:http://monitoring-influxdb:8086 - --sink=influxdb:http://monitoring-influxdb:8086
- image: gcr.io/google_containers/addon-resizer:1.8.1 - image: k8s.gcr.io/addon-resizer:1.8.1
name: heapster-nanny name: heapster-nanny
resources: resources:
limits: limits:
@@ -123,7 +123,7 @@ spec:
- --container=heapster - --container=heapster
- --poll-period=300000 - --poll-period=300000
- --estimator=exponential - --estimator=exponential
- image: gcr.io/google_containers/addon-resizer:1.8.1 - image: k8s.gcr.io/addon-resizer:1.8.1
name: eventer-nanny name: eventer-nanny
resources: resources:
limits: limits:

View File

@@ -29,7 +29,7 @@ spec:
operator: "Exists" operator: "Exists"
containers: containers:
- name: influxdb - name: influxdb
image: gcr.io/google_containers/heapster-influxdb-amd64:v1.3.3 image: k8s.gcr.io/heapster-influxdb-amd64:v1.3.3
resources: resources:
limits: limits:
cpu: 100m cpu: 100m
@@ -46,7 +46,7 @@ spec:
- name: influxdb-persistent-storage - name: influxdb-persistent-storage
mountPath: /data mountPath: /data
- name: grafana - name: grafana
image: gcr.io/google_containers/heapster-grafana-amd64:v4.4.3 image: k8s.gcr.io/heapster-grafana-amd64:v4.4.3
env: env:
resources: resources:
# keep request = limit to keep this container in guaranteed class # keep request = limit to keep this container in guaranteed class

View File

@@ -56,7 +56,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: '' scheduler.alpha.kubernetes.io/critical-pod: ''
spec: spec:
containers: containers:
- image: gcr.io/google_containers/heapster-amd64:v1.5.0 - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: heapster name: heapster
livenessProbe: livenessProbe:
httpGet: httpGet:
@@ -71,7 +71,7 @@ spec:
- --sink=stackdriver:?cluster_name={{ cluster_name }}&use_old_resources={{ use_old_resources }}&use_new_resources={{ use_new_resources }}&min_interval_sec=100&batch_export_timeout_sec=110 - --sink=stackdriver:?cluster_name={{ cluster_name }}&use_old_resources={{ use_old_resources }}&use_new_resources={{ use_new_resources }}&min_interval_sec=100&batch_export_timeout_sec=110
# BEGIN_PROMETHEUS_TO_SD # BEGIN_PROMETHEUS_TO_SD
- name: prom-to-sd - name: prom-to-sd
image: gcr.io/google-containers/prometheus-to-sd:v0.2.2 image: k8s.gcr.io/prometheus-to-sd:v0.2.2
command: command:
- /monitor - /monitor
- --source=heapster:http://localhost:8082?whitelisted=stackdriver_requests_count,stackdriver_timeseries_count - --source=heapster:http://localhost:8082?whitelisted=stackdriver_requests_count,stackdriver_timeseries_count
@@ -89,7 +89,7 @@ spec:
fieldRef: fieldRef:
fieldPath: metadata.namespace fieldPath: metadata.namespace
# END_PROMETHEUS_TO_SD # END_PROMETHEUS_TO_SD
- image: gcr.io/google_containers/addon-resizer:1.8.1 - image: k8s.gcr.io/addon-resizer:1.8.1
name: heapster-nanny name: heapster-nanny
resources: resources:
limits: limits:

View File

@@ -56,7 +56,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: '' scheduler.alpha.kubernetes.io/critical-pod: ''
spec: spec:
containers: containers:
- image: gcr.io/google_containers/heapster-amd64:v1.5.0 - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: heapster name: heapster
livenessProbe: livenessProbe:
httpGet: httpGet:
@@ -68,7 +68,7 @@ spec:
command: command:
- /heapster - /heapster
- --source=kubernetes.summary_api:'' - --source=kubernetes.summary_api:''
- image: gcr.io/google_containers/addon-resizer:1.8.1 - image: k8s.gcr.io/addon-resizer:1.8.1
name: heapster-nanny name: heapster-nanny
resources: resources:
limits: limits:

View File

@@ -29,7 +29,7 @@ spec:
spec: spec:
containers: containers:
- name: kubernetes-dashboard - name: kubernetes-dashboard
image: gcr.io/google_containers/kubernetes-dashboard-amd64:v1.8.0 image: k8s.gcr.io/kubernetes-dashboard-amd64:v1.8.0
resources: resources:
limits: limits:
cpu: 100m cpu: 100m

View File

@@ -77,7 +77,7 @@ spec:
spec: spec:
containers: containers:
- name: autoscaler - name: autoscaler
image: gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2-r2 image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2
resources: resources:
requests: requests:
cpu: "20m" cpu: "20m"

View File

@@ -94,7 +94,7 @@ spec:
optional: true optional: true
containers: containers:
- name: kubedns - name: kubedns
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7 image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.7
resources: resources:
# TODO: Set memory limits when we've profiled the container for large # TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in # clusters, then set request = limit to keep this container in
@@ -145,7 +145,7 @@ spec:
- name: kube-dns-config - name: kube-dns-config
mountPath: /kube-dns-config mountPath: /kube-dns-config
- name: dnsmasq - name: dnsmasq
image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7 image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.7
livenessProbe: livenessProbe:
httpGet: httpGet:
path: /healthcheck/dnsmasq path: /healthcheck/dnsmasq
@@ -184,7 +184,7 @@ spec:
- name: kube-dns-config - name: kube-dns-config
mountPath: /etc/k8s/dns/dnsmasq-nanny mountPath: /etc/k8s/dns/dnsmasq-nanny
- name: sidecar - name: sidecar
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7 image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.7
livenessProbe: livenessProbe:
httpGet: httpGet:
path: /metrics path: /metrics

View File

@@ -94,7 +94,7 @@ spec:
optional: true optional: true
containers: containers:
- name: kubedns - name: kubedns
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7 image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.7
resources: resources:
# TODO: Set memory limits when we've profiled the container for large # TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in # clusters, then set request = limit to keep this container in
@@ -145,7 +145,7 @@ spec:
- name: kube-dns-config - name: kube-dns-config
mountPath: /kube-dns-config mountPath: /kube-dns-config
- name: dnsmasq - name: dnsmasq
image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7 image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.7
livenessProbe: livenessProbe:
httpGet: httpGet:
path: /healthcheck/dnsmasq path: /healthcheck/dnsmasq
@@ -184,7 +184,7 @@ spec:
- name: kube-dns-config - name: kube-dns-config
mountPath: /etc/k8s/dns/dnsmasq-nanny mountPath: /etc/k8s/dns/dnsmasq-nanny
- name: sidecar - name: sidecar
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7 image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.7
livenessProbe: livenessProbe:
httpGet: httpGet:
path: /metrics path: /metrics

View File

@@ -94,7 +94,7 @@ spec:
optional: true optional: true
containers: containers:
- name: kubedns - name: kubedns
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7 image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.7
resources: resources:
# TODO: Set memory limits when we've profiled the container for large # TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in # clusters, then set request = limit to keep this container in
@@ -145,7 +145,7 @@ spec:
- name: kube-dns-config - name: kube-dns-config
mountPath: /kube-dns-config mountPath: /kube-dns-config
- name: dnsmasq - name: dnsmasq
image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7 image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.7
livenessProbe: livenessProbe:
httpGet: httpGet:
path: /healthcheck/dnsmasq path: /healthcheck/dnsmasq
@@ -184,7 +184,7 @@ spec:
- name: kube-dns-config - name: kube-dns-config
mountPath: /etc/k8s/dns/dnsmasq-nanny mountPath: /etc/k8s/dns/dnsmasq-nanny
- name: sidecar - name: sidecar
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7 image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.7
livenessProbe: livenessProbe:
httpGet: httpGet:
path: /metrics path: /metrics

View File

@@ -23,4 +23,4 @@ spec:
dnsPolicy: Default dnsPolicy: Default
containers: containers:
- name: etcd-empty-dir-cleanup - name: etcd-empty-dir-cleanup
image: gcr.io/google-containers/etcd-empty-dir-cleanup:3.0.14.0 image: k8s.gcr.io/etcd-empty-dir-cleanup:3.0.14.0

View File

@@ -14,7 +14,7 @@
.PHONY: binary build push .PHONY: binary build push
PREFIX = gcr.io/google-containers PREFIX = k8s.gcr.io
IMAGE = elasticsearch IMAGE = elasticsearch
TAG = v5.6.4 TAG = v5.6.4

View File

@@ -73,7 +73,7 @@ spec:
spec: spec:
serviceAccountName: elasticsearch-logging serviceAccountName: elasticsearch-logging
containers: containers:
- image: gcr.io/google-containers/elasticsearch:v5.6.4 - image: k8s.gcr.io/elasticsearch:v5.6.4
name: elasticsearch-logging name: elasticsearch-logging
resources: resources:
# need more cpu upon initialization, therefore burstable class # need more cpu upon initialization, therefore burstable class

View File

@@ -75,7 +75,7 @@ spec:
serviceAccountName: fluentd-es serviceAccountName: fluentd-es
containers: containers:
- name: fluentd-es - name: fluentd-es
image: gcr.io/google-containers/fluentd-elasticsearch:v2.0.2 image: k8s.gcr.io/fluentd-elasticsearch:v2.0.2
env: env:
- name: FLUENTD_ARGS - name: FLUENTD_ARGS
value: --no-supervisor -q value: --no-supervisor -q

View File

@@ -14,7 +14,7 @@
.PHONY: build push .PHONY: build push
PREFIX = gcr.io/google-containers PREFIX = k8s.gcr.io
IMAGE = fluentd-elasticsearch IMAGE = fluentd-elasticsearch
TAG = v2.0.2 TAG = v2.0.2

View File

@@ -4,11 +4,11 @@ that collects Docker container log files using [Fluentd][fluentd]
and sends them to an instance of [Elasticsearch][elasticsearch]. and sends them to an instance of [Elasticsearch][elasticsearch].
This image is designed to be used as part of the [Kubernetes][kubernetes] This image is designed to be used as part of the [Kubernetes][kubernetes]
cluster bring up process. The image resides at GCR under the name cluster bring up process. The image resides at GCR under the name
[gcr.io/google-containers/fluentd-elasticsearch][image]. [k8s.gcr.io/fluentd-elasticsearch][image].
[fluentd]: http://www.fluentd.org/ [fluentd]: http://www.fluentd.org/
[elasticsearch]: https://www.elastic.co/products/elasticsearch [elasticsearch]: https://www.elastic.co/products/elasticsearch
[kubernetes]: https://kubernetes.io [kubernetes]: https://kubernetes.io
[image]: https://gcr.io/google-containers/fluentd-elasticsearch [image]: https://k8s.gcr.io/fluentd-elasticsearch
[![Analytics](https://kubernetes-site.appspot.com/UA-36037335-10/GitHub/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md?pixel)]() [![Analytics](https://kubernetes-site.appspot.com/UA-36037335-10/GitHub/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md?pixel)]()

View File

@@ -47,12 +47,12 @@ spec:
serviceAccountName: event-exporter-sa serviceAccountName: event-exporter-sa
containers: containers:
- name: event-exporter - name: event-exporter
image: gcr.io/google-containers/event-exporter:v0.1.7 image: k8s.gcr.io/event-exporter:v0.1.7
command: command:
- '/event-exporter' - '/event-exporter'
# BEGIN_PROMETHEUS_TO_SD # BEGIN_PROMETHEUS_TO_SD
- name: prometheus-to-sd-exporter - name: prometheus-to-sd-exporter
image: gcr.io/google-containers/prometheus-to-sd:v0.2.2 image: k8s.gcr.io/prometheus-to-sd:v0.2.2
command: command:
- /monitor - /monitor
- --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons - --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons

View File

@@ -27,7 +27,7 @@ spec:
dnsPolicy: Default dnsPolicy: Default
containers: containers:
- name: fluentd-gcp - name: fluentd-gcp
image: gcr.io/google-containers/fluentd-gcp:2.0.11 image: k8s.gcr.io/fluentd-gcp:2.0.11
env: env:
- name: FLUENTD_ARGS - name: FLUENTD_ARGS
value: --no-supervisor -q value: --no-supervisor -q
@@ -82,7 +82,7 @@ spec:
fi; fi;
# BEGIN_PROMETHEUS_TO_SD # BEGIN_PROMETHEUS_TO_SD
- name: prometheus-to-sd-exporter - name: prometheus-to-sd-exporter
image: gcr.io/google-containers/prometheus-to-sd:v0.2.2 image: k8s.gcr.io/prometheus-to-sd:v0.2.2
command: command:
- /monitor - /monitor
- --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons - --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons

View File

@@ -28,7 +28,7 @@ spec:
hostNetwork: true hostNetwork: true
containers: containers:
- name: ip-masq-agent - name: ip-masq-agent
image: gcr.io/google-containers/ip-masq-agent-amd64:v2.0.2 image: k8s.gcr.io/ip-masq-agent-amd64:v2.0.2
resources: resources:
requests: requests:
cpu: 10m cpu: 10m

View File

@@ -38,7 +38,7 @@ spec:
dnsPolicy: Default dnsPolicy: Default
containers: containers:
- name: metadata-proxy - name: metadata-proxy
image: gcr.io/google_containers/metadata-proxy:v0.1.6 image: k8s.gcr.io/metadata-proxy:v0.1.6
securityContext: securityContext:
privileged: true privileged: true
# Request and limit resources to get guaranteed QoS. # Request and limit resources to get guaranteed QoS.
@@ -51,7 +51,7 @@ spec:
cpu: "30m" cpu: "30m"
# BEGIN_PROMETHEUS_TO_SD # BEGIN_PROMETHEUS_TO_SD
- name: prometheus-to-sd-exporter - name: prometheus-to-sd-exporter
image: gcr.io/google_containers/prometheus-to-sd:v0.2.2 image: k8s.gcr.io/prometheus-to-sd:v0.2.2
# Request and limit resources to get guaranteed QoS. # Request and limit resources to get guaranteed QoS.
resources: resources:
requests: requests:

View File

@@ -47,7 +47,7 @@ spec:
serviceAccountName: metrics-server serviceAccountName: metrics-server
containers: containers:
- name: metrics-server - name: metrics-server
image: gcr.io/google_containers/metrics-server-amd64:v0.2.0 image: k8s.gcr.io/metrics-server-amd64:v0.2.0
command: command:
- /metrics-server - /metrics-server
- --source=kubernetes.summary_api:'' - --source=kubernetes.summary_api:''
@@ -56,7 +56,7 @@ spec:
name: https name: https
protocol: TCP protocol: TCP
- name: metrics-server-nanny - name: metrics-server-nanny
image: gcr.io/google_containers/addon-resizer:1.8.1 image: k8s.gcr.io/addon-resizer:1.8.1
resources: resources:
limits: limits:
cpu: 100m cpu: 100m

View File

@@ -43,7 +43,7 @@ spec:
spec: spec:
containers: containers:
- name: node-problem-detector - name: node-problem-detector
image: gcr.io/google_containers/node-problem-detector:v0.4.1 image: k8s.gcr.io/node-problem-detector:v0.4.1
command: command:
- "/bin/sh" - "/bin/sh"
- "-c" - "-c"

View File

@@ -12,7 +12,7 @@
# See the License for the specific language governing permissions and # See the License for the specific language governing permissions and
# limitations under the License. # limitations under the License.
IMAGE=gcr.io/google_containers/python IMAGE=k8s.gcr.io/python
VERSION=v1 VERSION=v1
.PHONY: build push .PHONY: build push

View File

@@ -199,7 +199,7 @@ spec:
spec: spec:
containers: containers:
- name: kube-registry-proxy - name: kube-registry-proxy
image: gcr.io/google_containers/kube-registry-proxy:0.4 image: k8s.gcr.io/kube-registry-proxy:0.4
resources: resources:
limits: limits:
cpu: 100m cpu: 100m

View File

@@ -15,7 +15,7 @@
.PHONY: build push vet test clean .PHONY: build push vet test clean
TAG = 0.4 TAG = 0.4
REPO = gcr.io/google_containers/kube-registry-proxy REPO = k8s.gcr.io/kube-registry-proxy
build: build:
docker build --pull -t $(REPO):$(TAG) . docker build --pull -t $(REPO):$(TAG) .

View File

@@ -478,7 +478,7 @@ function stage-images() {
local docker_cmd=("docker") local docker_cmd=("docker")
if [[ "${KUBE_DOCKER_REGISTRY}" == "gcr.io/"* ]]; then if [[ "${KUBE_DOCKER_REGISTRY}" =~ "gcr.io/" ]]; then
local docker_push_cmd=("gcloud" "docker") local docker_push_cmd=("gcloud" "docker")
else else
local docker_push_cmd=("${docker_cmd[@]}") local docker_push_cmd=("${docker_cmd[@]}")
@@ -493,7 +493,7 @@ function stage-images() {
( (
"${docker_cmd[@]}" load -i "${temp_dir}/kubernetes/server/bin/${binary}.tar" "${docker_cmd[@]}" load -i "${temp_dir}/kubernetes/server/bin/${binary}.tar"
"${docker_cmd[@]}" rmi "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}" 2>/dev/null || true "${docker_cmd[@]}" rmi "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}" 2>/dev/null || true
"${docker_cmd[@]}" tag "gcr.io/google_containers/${binary}:${docker_tag}" "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}" "${docker_cmd[@]}" tag "k8s.gcr.io/${binary}:${docker_tag}" "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}"
"${docker_push_cmd[@]}" push "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}" "${docker_push_cmd[@]}" push "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}"
) &> "${temp_dir}/${binary}-push.log" & ) &> "${temp_dir}/${binary}-push.log" &
done done

View File

@@ -151,7 +151,7 @@ ENABLE_METRICS_SERVER="${KUBE_ENABLE_METRICS_SERVER:-true}"
# Useful for scheduling heapster in large clusters with nodes of small size. # Useful for scheduling heapster in large clusters with nodes of small size.
HEAPSTER_MACHINE_TYPE="${HEAPSTER_MACHINE_TYPE:-}" HEAPSTER_MACHINE_TYPE="${HEAPSTER_MACHINE_TYPE:-}"
# Set etcd image (e.g. gcr.io/google_containers/etcd) and version (e.g. 3.1.10) if you need # Set etcd image (e.g. k8s.gcr.io/etcd) and version (e.g. 3.1.10) if you need
# non-default version. # non-default version.
ETCD_IMAGE="${TEST_ETCD_IMAGE:-}" ETCD_IMAGE="${TEST_ETCD_IMAGE:-}"
ETCD_DOCKER_REPOSITORY="${TEST_ETCD_DOCKER_REPOSITORY:-}" ETCD_DOCKER_REPOSITORY="${TEST_ETCD_DOCKER_REPOSITORY:-}"

View File

@@ -671,7 +671,7 @@ function prepare-kube-proxy-manifest-variables {
remove-salt-config-comments "${src_file}" remove-salt-config-comments "${src_file}"
local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig" local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig"
local kube_docker_registry="gcr.io/google_containers" local kube_docker_registry="k8s.gcr.io"
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
kube_docker_registry=${KUBE_DOCKER_REGISTRY} kube_docker_registry=${KUBE_DOCKER_REGISTRY}
fi fi
@@ -853,7 +853,7 @@ function compute-master-manifest-variables {
CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}}," CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}},"
CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true}," CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true},"
fi fi
DOCKER_REGISTRY="gcr.io/google_containers" DOCKER_REGISTRY="k8s.gcr.io"
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}" DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}"
fi fi

View File

@@ -140,12 +140,12 @@ function install-kube-binary-config {
echo "Downloading k8s manifests tar" echo "Downloading k8s manifests tar"
download-or-bust "${manifests_tar_hash}" "${manifests_tar_urls[@]}" download-or-bust "${manifests_tar_hash}" "${manifests_tar_urls[@]}"
tar xzf "${KUBE_HOME}/${manifests_tar}" -C "${dst_dir}" --overwrite tar xzf "${KUBE_HOME}/${manifests_tar}" -C "${dst_dir}" --overwrite
local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-gcr.io/google_containers}" local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-k8s.gcr.io}"
if [[ "${kube_addon_registry}" != "gcr.io/google_containers" ]]; then if [[ "${kube_addon_registry}" != "k8s.gcr.io" ]]; then
find "${dst_dir}" -name \*.yaml -or -name \*.yaml.in | \ find "${dst_dir}" -name \*.yaml -or -name \*.yaml.in | \
xargs sed -ri "s@(image:\s.*)gcr.io/google_containers@\1${kube_addon_registry}@" xargs sed -ri "s@(image:\s.*)k8s.gcr.io@\1${kube_addon_registry}@"
find "${dst_dir}" -name \*.manifest -or -name \*.json | \ find "${dst_dir}" -name \*.manifest -or -name \*.json | \
xargs sed -ri "s@(image\":\s+\")gcr.io/google_containers@\1${kube_addon_registry}@" xargs sed -ri "s@(image\":\s+\")k8s.gcr.io@\1${kube_addon_registry}@"
fi fi
cp "${dst_dir}/kubernetes/gci-trusty/container-linux-configure-helper.sh" "${KUBE_HOME}/bin/configure-helper.sh" cp "${dst_dir}/kubernetes/gci-trusty/container-linux-configure-helper.sh" "${KUBE_HOME}/bin/configure-helper.sh"
chmod -R 755 "${kube_bin}" chmod -R 755 "${kube_bin}"

View File

@@ -1274,7 +1274,7 @@ function prepare-kube-proxy-manifest-variables {
remove-salt-config-comments "${src_file}" remove-salt-config-comments "${src_file}"
local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig" local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig"
local kube_docker_registry="gcr.io/google_containers" local kube_docker_registry="k8s.gcr.io"
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
kube_docker_registry=${KUBE_DOCKER_REGISTRY} kube_docker_registry=${KUBE_DOCKER_REGISTRY}
fi fi
@@ -1446,7 +1446,7 @@ function compute-master-manifest-variables {
CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}}," CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}},"
CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true}," CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true},"
fi fi
DOCKER_REGISTRY="gcr.io/google_containers" DOCKER_REGISTRY="k8s.gcr.io"
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}" DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}"
fi fi
@@ -2325,7 +2325,7 @@ spec:
- name: vol - name: vol
containers: containers:
- name: pv-recycler - name: pv-recycler
image: gcr.io/google_containers/busybox:1.27 image: k8s.gcr.io/busybox:1.27
command: command:
- /bin/sh - /bin/sh
args: args:

View File

@@ -221,12 +221,12 @@ function install-kube-manifests {
echo "Downloading k8s manifests tar" echo "Downloading k8s manifests tar"
download-or-bust "${manifests_tar_hash}" "${manifests_tar_urls[@]}" download-or-bust "${manifests_tar_hash}" "${manifests_tar_urls[@]}"
tar xzf "${KUBE_HOME}/${manifests_tar}" -C "${dst_dir}" --overwrite tar xzf "${KUBE_HOME}/${manifests_tar}" -C "${dst_dir}" --overwrite
local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-gcr.io/google_containers}" local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-k8s.gcr.io}"
if [[ "${kube_addon_registry}" != "gcr.io/google_containers" ]]; then if [[ "${kube_addon_registry}" != "k8s.gcr.io" ]]; then
find "${dst_dir}" -name \*.yaml -or -name \*.yaml.in | \ find "${dst_dir}" -name \*.yaml -or -name \*.yaml.in | \
xargs sed -ri "s@(image:\s.*)gcr.io/google_containers@\1${kube_addon_registry}@" xargs sed -ri "s@(image:\s.*)k8s.gcr.io@\1${kube_addon_registry}@"
find "${dst_dir}" -name \*.manifest -or -name \*.json | \ find "${dst_dir}" -name \*.manifest -or -name \*.json | \
xargs sed -ri "s@(image\":\s+\")gcr.io/google_containers@\1${kube_addon_registry}@" xargs sed -ri "s@(image\":\s+\")k8s.gcr.io@\1${kube_addon_registry}@"
fi fi
cp "${dst_dir}/kubernetes/gci-trusty/gci-configure-helper.sh" "${KUBE_BIN}/configure-helper.sh" cp "${dst_dir}/kubernetes/gci-trusty/gci-configure-helper.sh" "${KUBE_BIN}/configure-helper.sh"
cp "${dst_dir}/kubernetes/gci-trusty/health-monitor.sh" "${KUBE_BIN}/health-monitor.sh" cp "${dst_dir}/kubernetes/gci-trusty/health-monitor.sh" "${KUBE_BIN}/health-monitor.sh"

View File

@@ -13,7 +13,7 @@
# limitations under the License. # limitations under the License.
TAG=v2 TAG=v2
REGISTRY=gcr.io/google_containers REGISTRY=k8s.gcr.io
IMAGE=gci-mounter IMAGE=gci-mounter
all: container all: container

View File

@@ -236,12 +236,12 @@ function set-preferred-region() {
fi fi
# If we're using regional GCR, and we're outside the US, go to the # If we're using regional GCR, and we're outside the US, go to the
# regional registry. The gcr.io/google_containers registry is # regional registry. The k8s.gcr.io registry is
# appropriate for US (for now). # appropriate for US (for now).
if [[ "${REGIONAL_KUBE_ADDONS}" == "true" ]] && [[ "${preferred}" != "us" ]]; then if [[ "${REGIONAL_KUBE_ADDONS}" == "true" ]] && [[ "${preferred}" != "us" ]]; then
KUBE_ADDON_REGISTRY="${preferred}.gcr.io/google_containers" KUBE_ADDON_REGISTRY="${preferred}.k8s.gcr.io"
else else
KUBE_ADDON_REGISTRY="gcr.io/google_containers" KUBE_ADDON_REGISTRY="k8s.gcr.io"
fi fi
if [[ "${ENABLE_DOCKER_REGISTRY_CACHE:-}" == "true" ]]; then if [[ "${ENABLE_DOCKER_REGISTRY_CACHE:-}" == "true" ]]; then

View File

@@ -97,7 +97,7 @@ function create_cluster {
--pid=host \ --pid=host \
--privileged=true \ --privileged=true \
-d \ -d \
gcr.io/google_containers/hyperkube-${arch}:${release} \ k8s.gcr.io/hyperkube-${arch}:${release} \
/hyperkube kubelet \ /hyperkube kubelet \
--containerized \ --containerized \
--hostname-override="127.0.0.1" \ --hostname-override="127.0.0.1" \

View File

@@ -15,7 +15,7 @@
.PHONY: build push .PHONY: build push
ETCD_VERSION = 3.0.14 ETCD_VERSION = 3.0.14
IMAGE = gcr.io/google-containers/etcd-empty-dir-cleanup IMAGE = k8s.gcr.io/etcd-empty-dir-cleanup
TAG = 3.0.14.0 TAG = 3.0.14.0
clean: clean:

View File

@@ -15,11 +15,11 @@
# Build the etcd-version-monitor image # Build the etcd-version-monitor image
# #
# Usage: # Usage:
# [GOLANG_VERSION=1.8.3] [REGISTRY=gcr.io/google-containers] [TAG=test] make (build|push) # [GOLANG_VERSION=1.8.3] [REGISTRY=k8s.gcr.io] [TAG=test] make (build|push)
# TODO(shyamjvs): Support architectures other than amd64 if needed. # TODO(shyamjvs): Support architectures other than amd64 if needed.
ARCH:=amd64 ARCH:=amd64
GOLANG_VERSION?=1.8.3 GOLANG_VERSION?=1.8.3
REGISTRY?=gcr.io/google-containers REGISTRY?=k8s.gcr.io
TAG?=0.1.1 TAG?=0.1.1
IMAGE:=$(REGISTRY)/etcd-version-monitor:$(TAG) IMAGE:=$(REGISTRY)/etcd-version-monitor:$(TAG)
CURRENT_DIR:=$(pwd) CURRENT_DIR:=$(pwd)
@@ -30,8 +30,12 @@ build:
cp etcd-version-monitor.go Dockerfile $(TEMP_DIR) cp etcd-version-monitor.go Dockerfile $(TEMP_DIR)
# Compile etcd-version-monitor. # Compile etcd-version-monitor.
docker run -it -v $(shell pwd)/../../../:/go/src/k8s.io/kubernetes -v $(TEMP_DIR):/build -e GOARCH=$(ARCH) golang:$(GOLANG_VERSION) \ docker run -it \
/bin/bash -c "CGO_ENABLED=0 go build -o /build/etcd-version-monitor k8s.io/kubernetes/cluster/images/etcd-version-monitor" -v $(shell pwd)/../../../:/go/src/k8s.io/kubernetes \
-v $(TEMP_DIR):/build \
-e GOARCH=$(ARCH) \
golang:$(GOLANG_VERSION) \
/bin/bash -c "CGO_ENABLED=0 go build -o /build/etcd-version-monitor k8s.io/kubernetes/cluster/images/etcd-version-monitor"
docker build -t $(IMAGE) $(TEMP_DIR) docker build -t $(IMAGE) $(TEMP_DIR)

View File

@@ -18,7 +18,7 @@ latency metrics (`etcd_grpc_unary_requests_duration_seconds`) to be exposed.
To run this tool as a docker container: To run this tool as a docker container:
- make build - make build
- docker run --net=host -i -t gcr.io/google_containers/etcd-version-monitor:test /etcd-version-monitor --logtostderr - docker run --net=host -i -t k8s.gcr.io/etcd-version-monitor:test /etcd-version-monitor --logtostderr
To run this as a pod on the kubernetes cluster: To run this as a pod on the kubernetes cluster:
- Place the 'etcd-version-monitor.yaml' in the manifests directory of - Place the 'etcd-version-monitor.yaml' in the manifests directory of

View File

@@ -7,7 +7,7 @@ spec:
hostNetwork: true hostNetwork: true
containers: containers:
- name: etcd-version-monitor - name: etcd-version-monitor
image: gcr.io/google-containers/etcd-version-monitor:0.1.0 image: k8s.gcr.io/etcd-version-monitor:0.1.0
command: command:
- /etcd-version-monitor - /etcd-version-monitor
- --logtostderr - --logtostderr

View File

@@ -15,7 +15,7 @@
# Build the etcd image # Build the etcd image
# #
# Usage: # Usage:
# [TAGS=2.2.1 2.3.7 3.0.17 3.1.10] [REGISTRY=gcr.io/google_containers] [ARCH=amd64] [BASEIMAGE=busybox] make (build|push) # [TAGS=2.2.1 2.3.7 3.0.17 3.1.10] [REGISTRY=k8s.gcr.io] [ARCH=amd64] [BASEIMAGE=busybox] make (build|push)
# The image contains different etcd versions to simplify # The image contains different etcd versions to simplify
# upgrades. Thus be careful when removing any tag from here. # upgrades. Thus be careful when removing any tag from here.
@@ -29,7 +29,7 @@
TAGS?=2.2.1 2.3.7 3.0.17 3.1.10 TAGS?=2.2.1 2.3.7 3.0.17 3.1.10
REGISTRY_TAG?=3.1.10 REGISTRY_TAG?=3.1.10
ARCH?=amd64 ARCH?=amd64
REGISTRY?=gcr.io/google_containers REGISTRY?=k8s.gcr.io
GOLANG_VERSION?=1.7.6 GOLANG_VERSION?=1.7.6
GOARM=7 GOARM=7
TEMP_DIR:=$(shell mktemp -d) TEMP_DIR:=$(shell mktemp -d)

View File

@@ -10,20 +10,20 @@ For other architectures, `etcd` is cross-compiled from source. Arch-specific `bu
```console ```console
# Build for linux/amd64 (default) # Build for linux/amd64 (default)
$ make push ARCH=amd64 $ make push ARCH=amd64
# ---> gcr.io/google_containers/etcd-amd64:TAG # ---> k8s.gcr.io/etcd-amd64:TAG
# ---> gcr.io/google_containers/etcd:TAG # ---> k8s.gcr.io/etcd:TAG
$ make push ARCH=arm $ make push ARCH=arm
# ---> gcr.io/google_containers/etcd-arm:TAG # ---> k8s.gcr.io/etcd-arm:TAG
$ make push ARCH=arm64 $ make push ARCH=arm64
# ---> gcr.io/google_containers/etcd-arm64:TAG # ---> k8s.gcr.io/etcd-arm64:TAG
$ make push ARCH=ppc64le $ make push ARCH=ppc64le
# ---> gcr.io/google_containers/etcd-ppc64le:TAG # ---> k8s.gcr.io/etcd-ppc64le:TAG
$ make push ARCH=s390x $ make push ARCH=s390x
# ---> gcr.io/google_containers/etcd-s390x:TAG # ---> k8s.gcr.io/etcd-s390x:TAG
``` ```
If you don't want to push the images, run `make` or `make build` instead If you don't want to push the images, run `make` or `make build` instead

View File

@@ -27,7 +27,7 @@ docker_build(
docker_bundle( docker_bundle(
name = "hyperkube", name = "hyperkube",
images = {"gcr.io/google-containers/hyperkube-amd64:{STABLE_DOCKER_TAG}": "hyperkube-internal"}, images = {"k8s.gcr.io/hyperkube-amd64:{STABLE_DOCKER_TAG}": "hyperkube-internal"},
stamp = True, stamp = True,
) )

View File

@@ -16,7 +16,7 @@ FROM BASEIMAGE
# Create symlinks for each hyperkube server # Create symlinks for each hyperkube server
# Also create symlinks to /usr/local/bin/ where the server image binaries live, so the hyperkube image may be # Also create symlinks to /usr/local/bin/ where the server image binaries live, so the hyperkube image may be
# used instead of gcr.io/google_containers/kube-* without any modifications. # used instead of k8s.gcr.io/kube-* without any modifications.
# TODO: replace manual symlink creation with --make-symlink command once # TODO: replace manual symlink creation with --make-symlink command once
# cross-building with qemu supports go binaries. See #28702 # cross-building with qemu supports go binaries. See #28702
# RUN /hyperkube --make-symlinks # RUN /hyperkube --make-symlinks

View File

@@ -15,13 +15,13 @@
# Build the hyperkube image. # Build the hyperkube image.
# #
# Usage: # Usage:
# [ARCH=amd64] [REGISTRY="gcr.io/google-containers"] make (build|push) VERSION={some_released_version_of_kubernetes} # [ARCH=amd64] [REGISTRY="k8s.gcr.io"] make (build|push) VERSION={some_released_version_of_kubernetes}
REGISTRY?=gcr.io/google-containers REGISTRY?=k8s.gcr.io
ARCH?=amd64 ARCH?=amd64
HYPERKUBE_BIN?=_output/dockerized/bin/linux/$(ARCH)/hyperkube HYPERKUBE_BIN?=_output/dockerized/bin/linux/$(ARCH)/hyperkube
BASEIMAGE=gcr.io/google-containers/debian-hyperkube-base-$(ARCH):0.8 BASEIMAGE=k8s.gcr.io/debian-hyperkube-base-$(ARCH):0.8
TEMP_DIR:=$(shell mktemp -d -t hyperkubeXXXXXX) TEMP_DIR:=$(shell mktemp -d -t hyperkubeXXXXXX)
all: build all: build

View File

@@ -10,23 +10,23 @@
$ build/run.sh make cross $ build/run.sh make cross
# Build for linux/amd64 (default) # Build for linux/amd64 (default)
# export REGISTRY=$HOST/$ORG to switch from gcr.io/google_containers # export REGISTRY=$HOST/$ORG to switch from k8s.gcr.io
$ make push VERSION={target_version} ARCH=amd64 $ make push VERSION={target_version} ARCH=amd64
# ---> gcr.io/google_containers/hyperkube-amd64:VERSION # ---> k8s.gcr.io/hyperkube-amd64:VERSION
# ---> gcr.io/google_containers/hyperkube:VERSION (image with backwards-compatible naming) # ---> k8s.gcr.io/hyperkube:VERSION (image with backwards-compatible naming)
$ make push VERSION={target_version} ARCH=arm $ make push VERSION={target_version} ARCH=arm
# ---> gcr.io/google_containers/hyperkube-arm:VERSION # ---> k8s.gcr.io/hyperkube-arm:VERSION
$ make push VERSION={target_version} ARCH=arm64 $ make push VERSION={target_version} ARCH=arm64
# ---> gcr.io/google_containers/hyperkube-arm64:VERSION # ---> k8s.gcr.io/hyperkube-arm64:VERSION
$ make push VERSION={target_version} ARCH=ppc64le $ make push VERSION={target_version} ARCH=ppc64le
# ---> gcr.io/google_containers/hyperkube-ppc64le:VERSION # ---> k8s.gcr.io/hyperkube-ppc64le:VERSION
$ make push VERSION={target_version} ARCH=s390x $ make push VERSION={target_version} ARCH=s390x
# ---> gcr.io/google_containers/hyperkube-s390x:VERSION # ---> k8s.gcr.io/hyperkube-s390x:VERSION
``` ```
If you don't want to push the images, run `make` or `make build` instead If you don't want to push the images, run `make` or `make build` instead

View File

@@ -15,8 +15,8 @@
# build Kubemark image from currently built binaries containing both 'real' master and Hollow Node. # build Kubemark image from currently built binaries containing both 'real' master and Hollow Node.
# This makefile assumes that the kubemark binary is present in this directory. # This makefile assumes that the kubemark binary is present in this directory.
REGISTRY?=gcr.io REGISTRY ?= gcr.io
PROJECT?=google_containers PROJECT ?=
all: gcloudpush all: gcloudpush

View File

@@ -635,10 +635,10 @@ def launch_default_ingress_controller():
addon_path = '/root/cdk/addons/{}' addon_path = '/root/cdk/addons/{}'
context['defaultbackend_image'] = \ context['defaultbackend_image'] = \
"gcr.io/google_containers/defaultbackend:1.4" "k8s.gcr.io/defaultbackend:1.4"
if arch() == 's390x': if arch() == 's390x':
context['defaultbackend_image'] = \ context['defaultbackend_image'] = \
"gcr.io/google_containers/defaultbackend-s390x:1.4" "k8s.gcr.io/defaultbackend-s390x:1.4"
# Render the default http backend (404) replicationcontroller manifest # Render the default http backend (404) replicationcontroller manifest
manifest = addon_path.format('default-http-backend.yaml') manifest = addon_path.format('default-http-backend.yaml')
@@ -655,7 +655,7 @@ def launch_default_ingress_controller():
# Render the ingress replication controller manifest # Render the ingress replication controller manifest
context['ingress_image'] = \ context['ingress_image'] = \
"gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.13" "k8s.gcr.io/nginx-ingress-controller:0.9.0-beta.13"
if arch() == 's390x': if arch() == 's390x':
context['ingress_image'] = \ context['ingress_image'] = \
"docker.io/cdkbot/nginx-ingress-controller-s390x:0.9.0-beta.13" "docker.io/cdkbot/nginx-ingress-controller-s390x:0.9.0-beta.13"

View File

@@ -61,7 +61,7 @@ RUNTIME_CONFIG="${KUBE_RUNTIME_CONFIG:-}"
TERMINATED_POD_GC_THRESHOLD=${TERMINATED_POD_GC_THRESHOLD:-100} TERMINATED_POD_GC_THRESHOLD=${TERMINATED_POD_GC_THRESHOLD:-100}
KUBE_APISERVER_REQUEST_TIMEOUT=300 KUBE_APISERVER_REQUEST_TIMEOUT=300
# Set etcd image (e.g. gcr.io/google_containers/etcd) and version (e.g. 3.1.10) if you need # Set etcd image (e.g. k8s.gcr.io/etcd) and version (e.g. 3.1.10) if you need
# non-default version. # non-default version.
ETCD_IMAGE="${TEST_ETCD_IMAGE:-}" ETCD_IMAGE="${TEST_ETCD_IMAGE:-}"
ETCD_VERSION="${TEST_ETCD_VERSION:-}" ETCD_VERSION="${TEST_ETCD_VERSION:-}"

View File

@@ -36,7 +36,7 @@ spec:
spec: spec:
containers: containers:
- name: logexporter-test - name: logexporter-test
image: gcr.io/google-containers/logexporter:v0.1.1 image: k8s.gcr.io/logexporter:v0.1.1
env: env:
- name: NODE_NAME - name: NODE_NAME
valueFrom: valueFrom:

View File

@@ -160,7 +160,7 @@ if [ "${ETCD_API}" == "etcd2" ]; then
echo "Starting etcd ${ETCD_VERSION} to restore data" echo "Starting etcd ${ETCD_VERSION} to restore data"
image=$(docker run -d -v ${BACKUP_DIR}:/var/etcd/data \ image=$(docker run -d -v ${BACKUP_DIR}:/var/etcd/data \
--net=host -p ${etcd_port}:${etcd_port} \ --net=host -p ${etcd_port}:${etcd_port} \
"gcr.io/google_containers/etcd:${ETCD_VERSION}" /bin/sh -c \ "k8s.gcr.io/etcd:${ETCD_VERSION}" /bin/sh -c \
"/usr/local/bin/etcd --data-dir /var/etcd/data --force-new-cluster") "/usr/local/bin/etcd --data-dir /var/etcd/data --force-new-cluster")
if [ "$?" -ne "0" ]; then if [ "$?" -ne "0" ]; then
echo "Docker container didn't started correctly" echo "Docker container didn't started correctly"
@@ -191,7 +191,7 @@ elif [ "${ETCD_API}" == "etcd3" ]; then
# Run etcdctl snapshot restore command and wait until it is finished. # Run etcdctl snapshot restore command and wait until it is finished.
# setting with --name in the etcd manifest file and then it seems to work. # setting with --name in the etcd manifest file and then it seems to work.
docker run -v ${BACKUP_DIR}:/var/tmp/backup --env ETCDCTL_API=3 \ docker run -v ${BACKUP_DIR}:/var/tmp/backup --env ETCDCTL_API=3 \
"gcr.io/google_containers/etcd:${ETCD_VERSION}" /bin/sh -c \ "k8s.gcr.io/etcd:${ETCD_VERSION}" /bin/sh -c \
"/usr/local/bin/etcdctl snapshot restore ${BACKUP_DIR}/${snapshot} --name ${NAME} --initial-cluster ${INITIAL_CLUSTER} --initial-advertise-peer-urls ${INITIAL_ADVERTISE_PEER_URLS}; mv /${NAME}.etcd/member /var/tmp/backup/" "/usr/local/bin/etcdctl snapshot restore ${BACKUP_DIR}/${snapshot} --name ${NAME} --initial-cluster ${INITIAL_CLUSTER} --initial-advertise-peer-urls ${INITIAL_ADVERTISE_PEER_URLS}; mv /${NAME}.etcd/member /var/tmp/backup/"
if [ "$?" -ne "0" ]; then if [ "$?" -ne "0" ]; then
echo "Docker container didn't started correctly" echo "Docker container didn't started correctly"

View File

@@ -81,7 +81,7 @@ for docker_file in "${KUBE_DOCKER_WRAPPED_BINARIES[@]}"; do
done done
cat <<EOF >>"${docker_images_sls_file}" cat <<EOF >>"${docker_images_sls_file}"
kube_docker_registry: '$(echo ${KUBE_DOCKER_REGISTRY:-gcr.io/google_containers})' kube_docker_registry: '$(echo ${KUBE_DOCKER_REGISTRY:-k8s.gcr.io})'
EOF EOF
# TODO(zmerlynn): Forgive me, this is really gross. But in order to # TODO(zmerlynn): Forgive me, this is really gross. But in order to
@@ -89,13 +89,13 @@ EOF
# have to templatize a couple of the add-ons anyways, manually # have to templatize a couple of the add-ons anyways, manually
# templatize the addon registry for regional support. When we get # templatize the addon registry for regional support. When we get
# better templating, we can fix this. # better templating, we can fix this.
readonly kube_addon_registry="${KUBE_ADDON_REGISTRY:-gcr.io/google_containers}" readonly kube_addon_registry="${KUBE_ADDON_REGISTRY:-k8s.gcr.io}"
if [[ "${kube_addon_registry}" != "gcr.io/google_containers" ]]; then if [[ "${kube_addon_registry}" != "k8s.gcr.io" ]]; then
find /srv/salt-new -name \*.yaml -or -name \*.yaml.in | \ find /srv/salt-new -name \*.yaml -or -name \*.yaml.in | \
xargs sed -ri "s@(image:\s.*)gcr.io/google_containers@\1${kube_addon_registry}@" xargs sed -ri "s@(image:\s.*)k8s.gcr.io@\1${kube_addon_registry}@"
# All the legacy .manifest files with hardcoded gcr.io are JSON. # All the legacy .manifest files with hardcoded gcr.io are JSON.
find /srv/salt-new -name \*.manifest -or -name \*.json | \ find /srv/salt-new -name \*.manifest -or -name \*.json | \
xargs sed -ri "s@(image\":\s+\")gcr.io/google_containers@\1${kube_addon_registry}@" xargs sed -ri "s@(image\":\s+\")k8s.gcr.io@\1${kube_addon_registry}@"
fi fi
echo "+++ Swapping in new configs" echo "+++ Swapping in new configs"

View File

@@ -25,15 +25,15 @@
"containers": [ "containers": [
{ {
"name": "cluster-autoscaler", "name": "cluster-autoscaler",
"image": "gcr.io/google_containers/cluster-autoscaler:v1.1.0", "image": "k8s.gcr.io/cluster-autoscaler:v1.1.0",
"livenessProbe": { "livenessProbe": {
"httpGet": { "httpGet": {
"path": "/health-check", "path": "/health-check",
"port": 8085 "port": 8085
}, },
"initialDelaySeconds": 600, "initialDelaySeconds": 600,
"periodSeconds": 60 "periodSeconds": 60
}, },
"command": [ "command": [
"./run.sh", "./run.sh",
"--kubernetes=http://127.0.0.1:8080?inClusterConfig=f", "--kubernetes=http://127.0.0.1:8080?inClusterConfig=f",

View File

@@ -14,13 +14,13 @@ spec:
cpu: 100m cpu: 100m
limits: limits:
cpu: 100m cpu: 100m
image: gcr.io/google_containers/busybox:1.24 image: k8s.gcr.io/busybox:1.24
# TODO: Replace this with a go script that pulls in parallel? # TODO: Replace this with a go script that pulls in parallel?
# Currently it takes ~5m to pull all e2e images, so this is OK, and # Currently it takes ~5m to pull all e2e images, so this is OK, and
# fewer moving parts is always better. # fewer moving parts is always better.
# TODO: Replace the hardcoded image list with an autogen list; the list is # TODO: Replace the hardcoded image list with an autogen list; the list is
# currently hard-coded for static verification. It was generated via: # currently hard-coded for static verification. It was generated via:
# grep -Iiroh "gcr.io/google_.*" "${KUBE_ROOT}/test/e2e" | \ # grep -Iiroh "gcr.io/.*" "${KUBE_ROOT}/test/e2e" | \
# sed -e "s/[,\")}]//g" | awk '{print $1}' | sort | uniq | tr '\n' ' ' # sed -e "s/[,\")}]//g" | awk '{print $1}' | sort | uniq | tr '\n' ' '
# We always want the subshell to exit 0 so this pod doesn't end up # We always want the subshell to exit 0 so this pod doesn't end up
# blocking tests in an Error state. # blocking tests in an Error state.
@@ -29,52 +29,52 @@ spec:
- -c - -c
- > - >
for i in for i in
gcr.io/google_containers/alpine-with-bash:1.0 k8s.gcr.io/alpine-with-bash:1.0
gcr.io/google_containers/apparmor-loader:0.1 k8s.gcr.io/apparmor-loader:0.1
gcr.io/google_containers/busybox:1.24 k8s.gcr.io/busybox:1.24
gcr.io/google_containers/dnsutils:e2e k8s.gcr.io/dnsutils:e2e
gcr.io/google_containers/e2e-net-amd64:1.0 k8s.gcr.io/e2e-net-amd64:1.0
gcr.io/google_containers/echoserver:1.6 k8s.gcr.io/echoserver:1.6
gcr.io/google_containers/eptest:0.1 k8s.gcr.io/eptest:0.1
gcr.io/google_containers/fakegitserver:0.1 k8s.gcr.io/fakegitserver:0.1
gcr.io/google_containers/galera-install:0.1 k8s.gcr.io/galera-install:0.1
gcr.io/google_containers/hostexec:1.2 k8s.gcr.io/hostexec:1.2
gcr.io/google_containers/invalid-image:invalid-tag k8s.gcr.io/invalid-image:invalid-tag
gcr.io/google_containers/iperf:e2e k8s.gcr.io/iperf:e2e
gcr.io/google_containers/jessie-dnsutils:e2e k8s.gcr.io/jessie-dnsutils:e2e
gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.14.5 k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.5
gcr.io/google_containers/liveness:e2e k8s.gcr.io/liveness:e2e
gcr.io/google_containers/logs-generator:v0.1.0 k8s.gcr.io/logs-generator:v0.1.0
gcr.io/google_containers/mounttest:0.8 k8s.gcr.io/mounttest:0.8
gcr.io/google_containers/mounttest-user:0.5 k8s.gcr.io/mounttest-user:0.5
gcr.io/google_containers/mysql-galera:e2e k8s.gcr.io/mysql-galera:e2e
gcr.io/google_containers/mysql-healthz:1.0 k8s.gcr.io/mysql-healthz:1.0
gcr.io/google_containers/netexec:1.4 k8s.gcr.io/netexec:1.4
gcr.io/google_containers/netexec:1.5 k8s.gcr.io/netexec:1.5
gcr.io/google_containers/netexec:1.7 k8s.gcr.io/netexec:1.7
gcr.io/google_containers/nettest:1.7 k8s.gcr.io/nettest:1.7
gcr.io/google_containers/nginx:1.7.9 k8s.gcr.io/nginx:1.7.9
gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.1 k8s.gcr.io/nginx-ingress-controller:0.9.0-beta.1
gcr.io/google_containers/nginx-slim:0.7 k8s.gcr.io/nginx-slim:0.7
gcr.io/google_containers/nginx-slim:0.8 k8s.gcr.io/nginx-slim:0.8
gcr.io/google_containers/node-problem-detector:v0.3.0 k8s.gcr.io/node-problem-detector:v0.3.0
gcr.io/google_containers/pause k8s.gcr.io/pause
gcr.io/google_containers/porter:4524579c0eb935c056c8e75563b4e1eda31587e0 k8s.gcr.io/porter:4524579c0eb935c056c8e75563b4e1eda31587e0
gcr.io/google_containers/portforwardtester:1.2 k8s.gcr.io/portforwardtester:1.2
gcr.io/google_containers/redis-install-3.2.0:e2e k8s.gcr.io/redis-install-3.2.0:e2e
gcr.io/google_containers/resource_consumer:beta4 k8s.gcr.io/resource_consumer:beta4
gcr.io/google_containers/resource_consumer/controller:beta4 k8s.gcr.io/resource_consumer/controller:beta4
gcr.io/kubernetes-e2e-test-images/serve-hostname-amd64:1.1 gcr.io/kubernetes-e2e-test-images/serve-hostname-amd64:1.1
gcr.io/google_containers/servicelb:0.1 k8s.gcr.io/servicelb:0.1
gcr.io/google_containers/test-webserver:e2e k8s.gcr.io/test-webserver:e2e
gcr.io/google_containers/update-demo:kitten k8s.gcr.io/update-demo:kitten
gcr.io/google_containers/update-demo:nautilus k8s.gcr.io/update-demo:nautilus
gcr.io/google_containers/volume-ceph:0.1 k8s.gcr.io/volume-ceph:0.1
gcr.io/google_containers/volume-gluster:0.2 k8s.gcr.io/volume-gluster:0.2
gcr.io/google_containers/volume-iscsi:0.1 k8s.gcr.io/volume-iscsi:0.1
gcr.io/google_containers/volume-nfs:0.8 k8s.gcr.io/volume-nfs:0.8
gcr.io/google_containers/volume-rbd:0.1 k8s.gcr.io/volume-rbd:0.1
gcr.io/google_containers/zookeeper-install-3.5.0-alpha:e2e k8s.gcr.io/zookeeper-install-3.5.0-alpha:e2e
gcr.io/google_samples/gb-redisslave:nonexistent gcr.io/google_samples/gb-redisslave:nonexistent
; do echo $(date '+%X') pulling $i; docker pull $i 1>/dev/null; done; exit 0; ; do echo $(date '+%X') pulling $i; docker pull $i 1>/dev/null; done; exit 0;
securityContext: securityContext:
@@ -91,7 +91,7 @@ spec:
cpu: 100m cpu: 100m
limits: limits:
cpu: 100m cpu: 100m
image: gcr.io/google_containers/kube-nethealth-amd64:1.0 image: k8s.gcr.io/kube-nethealth-amd64:1.0
command: command:
- /bin/sh - /bin/sh
- -c - -c

View File

@@ -39,7 +39,7 @@
"containers":[ "containers":[
{ {
"name": "etcd-container", "name": "etcd-container",
"image": "{{ pillar.get('etcd_docker_repository', 'gcr.io/google_containers/etcd') }}:{{ pillar.get('etcd_docker_tag', '3.1.10') }}", "image": "{{ pillar.get('etcd_docker_repository', 'k8s.gcr.io/etcd') }}:{{ pillar.get('etcd_docker_tag', '3.1.10') }}",
"resources": { "resources": {
"requests": { "requests": {
"cpu": {{ cpulimit }} "cpu": {{ cpulimit }}

View File

@@ -13,7 +13,7 @@ spec:
- name: kube-addon-manager - name: kube-addon-manager
# When updating version also bump it in: # When updating version also bump it in:
# - test/kubemark/resources/manifests/kube-addon-manager.yaml # - test/kubemark/resources/manifests/kube-addon-manager.yaml
image: gcr.io/google-containers/kube-addon-manager:v6.5 image: k8s.gcr.io/kube-addon-manager:v6.5
command: command:
- /bin/bash - /bin/bash
- -c - -c

View File

@@ -18,7 +18,7 @@ spec:
spec: spec:
containers: containers:
- name: kube-registry-proxy - name: kube-registry-proxy
image: gcr.io/google_containers/kube-registry-proxy:0.4 image: k8s.gcr.io/kube-registry-proxy:0.4
resources: resources:
limits: limits:
cpu: 100m cpu: 100m

View File

@@ -13,7 +13,7 @@ spec:
terminationGracePeriodSeconds: 600 terminationGracePeriodSeconds: 600
hostNetwork: true hostNetwork: true
containers: containers:
- image: gcr.io/google_containers/glbc:0.9.7 - image: k8s.gcr.io/glbc:0.9.7
livenessProbe: livenessProbe:
httpGet: httpGet:
path: /healthz path: /healthz

View File

@@ -13,7 +13,7 @@ metadata:
spec: spec:
hostNetwork: true hostNetwork: true
containers: containers:
- image: gcr.io/google-containers/rescheduler:v0.3.1 - image: k8s.gcr.io/rescheduler:v0.3.1
name: rescheduler name: rescheduler
volumeMounts: volumeMounts:
- mountPath: /var/log/rescheduler.log - mountPath: /var/log/rescheduler.log

View File

@@ -47,7 +47,7 @@ const (
// DefaultCertificatesDir defines default certificate directory // DefaultCertificatesDir defines default certificate directory
DefaultCertificatesDir = "/etc/kubernetes/pki" DefaultCertificatesDir = "/etc/kubernetes/pki"
// DefaultImageRepository defines default image registry // DefaultImageRepository defines default image registry
DefaultImageRepository = "gcr.io/google_containers" DefaultImageRepository = "k8s.gcr.io"
// DefaultManifestsDir defines default manifests directory // DefaultManifestsDir defines default manifests directory
DefaultManifestsDir = "/etc/kubernetes/manifests" DefaultManifestsDir = "/etc/kubernetes/manifests"

View File

@@ -27,7 +27,7 @@ import (
const ( const (
testversion = "v10.1.2-alpha.1.100+0123456789abcdef+SOMETHING" testversion = "v10.1.2-alpha.1.100+0123456789abcdef+SOMETHING"
expected = "v10.1.2-alpha.1.100_0123456789abcdef_SOMETHING" expected = "v10.1.2-alpha.1.100_0123456789abcdef_SOMETHING"
gcrPrefix = "gcr.io/google_containers" gcrPrefix = "k8s.gcr.io"
) )
func TestGetCoreImage(t *testing.T) { func TestGetCoreImage(t *testing.T) {

View File

@@ -66,7 +66,7 @@ spec:
- --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key - --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key
- --authorization-mode=Node,RBAC - --authorization-mode=Node,RBAC
- --etcd-servers=http://127.0.0.1:2379 - --etcd-servers=http://127.0.0.1:2379
image: gcr.io/google_containers/kube-apiserver-amd64:v1.7.4 image: k8s.gcr.io/kube-apiserver-amd64:v1.7.4
livenessProbe: livenessProbe:
failureThreshold: 8 failureThreshold: 8
httpGet: httpGet:
@@ -148,7 +148,7 @@ spec:
- --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key - --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key
- --authorization-mode=Node,RBAC - --authorization-mode=Node,RBAC
- --etcd-servers=http://127.0.0.1:2379 - --etcd-servers=http://127.0.0.1:2379
image: gcr.io/google_containers/kube-apiserver-amd64:v1.7.4 image: k8s.gcr.io/kube-apiserver-amd64:v1.7.4
livenessProbe: livenessProbe:
failureThreshold: 8 failureThreshold: 8
httpGet: httpGet:
@@ -220,7 +220,7 @@ spec:
- --cluster-signing-key-file=/etc/kubernetes/pki/ca.key - --cluster-signing-key-file=/etc/kubernetes/pki/ca.key
- --address=127.0.0.1 - --address=127.0.0.1
- --use-service-account-credentials=true - --use-service-account-credentials=true
image: gcr.io/google_containers/kube-controller-manager-amd64:v1.7.4 image: k8s.gcr.io/kube-controller-manager-amd64:v1.7.4
livenessProbe: livenessProbe:
failureThreshold: 8 failureThreshold: 8
httpGet: httpGet:
@@ -295,7 +295,7 @@ spec:
- --cluster-signing-key-file=/etc/kubernetes/pki/ca.key - --cluster-signing-key-file=/etc/kubernetes/pki/ca.key
- --address=127.0.0.1 - --address=127.0.0.1
- --use-service-account-credentials=true - --use-service-account-credentials=true
image: gcr.io/google_containers/kube-controller-manager-amd64:v1.7.4 image: k8s.gcr.io/kube-controller-manager-amd64:v1.7.4
livenessProbe: livenessProbe:
failureThreshold: 8 failureThreshold: 8
httpGet: httpGet:
@@ -368,7 +368,7 @@ spec:
- --leader-elect=true - --leader-elect=true
- --kubeconfig=/etc/kubernetes/scheduler.conf - --kubeconfig=/etc/kubernetes/scheduler.conf
- --address=127.0.0.1 - --address=127.0.0.1
image: gcr.io/google_containers/kube-scheduler-amd64:v1.7.4 image: k8s.gcr.io/kube-scheduler-amd64:v1.7.4
livenessProbe: livenessProbe:
failureThreshold: 8 failureThreshold: 8
httpGet: httpGet:
@@ -419,7 +419,7 @@ spec:
- --leader-elect=true - --leader-elect=true
- --kubeconfig=/etc/kubernetes/scheduler.conf - --kubeconfig=/etc/kubernetes/scheduler.conf
- --address=127.0.0.1 - --address=127.0.0.1
image: gcr.io/google_containers/kube-scheduler-amd64:v1.7.4 image: k8s.gcr.io/kube-scheduler-amd64:v1.7.4
livenessProbe: livenessProbe:
failureThreshold: 8 failureThreshold: 8
httpGet: httpGet:
@@ -521,7 +521,7 @@ metadata:
name: testpod name: testpod
spec: spec:
containers: containers:
- image: gcr.io/google_containers/busybox - image: k8s.gcr.io/busybox
`, `,
expectError: false, expectError: false,
}, },
@@ -537,7 +537,7 @@ spec:
"spec": { "spec": {
"containers": [ "containers": [
{ {
"image": "gcr.io/google_containers/busybox" "image": "k8s.gcr.io/busybox"
} }
] ]
} }
@@ -552,7 +552,7 @@ kind: Pod
metadata: metadata:
name: testpod name: testpod
spec: spec:
- image: gcr.io/google_containers/busybox - image: k8s.gcr.io/busybox
`, `,
expectError: true, expectError: true,
}, },

View File

@@ -61,7 +61,7 @@ etcd:
image: "" image: ""
keyFile: "" keyFile: ""
featureFlags: null featureFlags: null
imageRepository: gcr.io/google_containers imageRepository: k8s.gcr.io
kubernetesVersion: %s kubernetesVersion: %s
networking: networking:
dnsDomain: cluster.local dnsDomain: cluster.local

View File

@@ -22,8 +22,8 @@ import (
const ( const (
validTmpl = "image: {{ .ImageRepository }}/pause-{{ .Arch }}:3.0" validTmpl = "image: {{ .ImageRepository }}/pause-{{ .Arch }}:3.0"
validTmplOut = "image: gcr.io/google_containers/pause-amd64:3.0" validTmplOut = "image: k8s.gcr.io/pause-amd64:3.0"
doNothing = "image: gcr.io/google_containers/pause-amd64:3.0" doNothing = "image: k8s.gcr.io/pause-amd64:3.0"
invalidTmpl1 = "{{ .baz }/d}" invalidTmpl1 = "{{ .baz }/d}"
invalidTmpl2 = "{{ !foobar }}" invalidTmpl2 = "{{ !foobar }}"
) )
@@ -39,7 +39,7 @@ func TestParseTemplate(t *testing.T) {
{ {
template: validTmpl, template: validTmpl,
data: struct{ ImageRepository, Arch string }{ data: struct{ ImageRepository, Arch string }{
ImageRepository: "gcr.io/google_containers", ImageRepository: "k8s.gcr.io",
Arch: "amd64", Arch: "amd64",
}, },
output: validTmplOut, output: validTmplOut,
@@ -49,7 +49,7 @@ func TestParseTemplate(t *testing.T) {
{ {
template: doNothing, template: doNothing,
data: struct{ ImageRepository, Arch string }{ data: struct{ ImageRepository, Arch string }{
ImageRepository: "gcr.io/google_containers", ImageRepository: "k8s.gcr.io",
Arch: "amd64", Arch: "amd64",
}, },
output: doNothing, output: doNothing,

View File

@@ -27,7 +27,7 @@ import (
const ( const (
// When these values are updated, also update test/e2e/framework/util.go // When these values are updated, also update test/e2e/framework/util.go
defaultPodSandboxImageName = "gcr.io/google_containers/pause" defaultPodSandboxImageName = "k8s.gcr.io/pause"
defaultPodSandboxImageVersion = "3.0" defaultPodSandboxImageVersion = "3.0"
// From pkg/kubelet/rkt/rkt.go to avoid circular import // From pkg/kubelet/rkt/rkt.go to avoid circular import
defaultRktAPIServiceEndpoint = "localhost:15441" defaultRktAPIServiceEndpoint = "localhost:15441"

View File

@@ -5194,7 +5194,7 @@ Examples:<br>
<tbody> <tbody>
<tr> <tr>
<td class="tableblock halign-left valign-top"><p class="tableblock">names</p></td> <td class="tableblock halign-left valign-top"><p class="tableblock">names</p></td>
<td class="tableblock halign-left valign-top"><p class="tableblock">Names by which this image is known. e.g. ["gcr.io/google_containers/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"]</p></td> <td class="tableblock halign-left valign-top"><p class="tableblock">Names by which this image is known. e.g. ["k8s.gcr.io/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"]</p></td>
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td> <td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
<td class="tableblock halign-left valign-top"><p class="tableblock">string array</p></td> <td class="tableblock halign-left valign-top"><p class="tableblock">string array</p></td>
<td class="tableblock halign-left valign-top"></td> <td class="tableblock halign-left valign-top"></td>

View File

@@ -15,7 +15,7 @@ spec:
spec: spec:
containers: containers:
- name: dns-backend - name: dns-backend
image: gcr.io/google_containers/example-dns-backend:v1 image: k8s.gcr.io/example-dns-backend:v1
ports: ports:
- name: backend-port - name: backend-port
containerPort: 8000 containerPort: 8000

View File

@@ -7,7 +7,7 @@ metadata:
spec: spec:
containers: containers:
- name: dns-frontend - name: dns-frontend
image: gcr.io/google_containers/example-dns-frontend:v1 image: k8s.gcr.io/example-dns-frontend:v1
command: command:
- python - python
- client.py - client.py

View File

@@ -13,7 +13,7 @@
# limitations under the License. # limitations under the License.
TAG = v1 TAG = v1
PREFIX = gcr.io/google_containers PREFIX = k8s.gcr.io
IMAGE = example-dns-backend IMAGE = example-dns-backend
all: push all: push

View File

@@ -13,7 +13,7 @@
# limitations under the License. # limitations under the License.
TAG = v1 TAG = v1
PREFIX = gcr.io/google_containers PREFIX = k8s.gcr.io
IMAGE = example-dns-frontend IMAGE = example-dns-frontend
all: push all: push

View File

@@ -21,10 +21,10 @@ explorer: explorer.go
CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -ldflags '-w' ./explorer.go CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -ldflags '-w' ./explorer.go
container: explorer container: explorer
docker build --pull -t gcr.io/google_containers/explorer:$(TAG) . docker build --pull -t k8s.gcr.io/explorer:$(TAG) .
push: container push: container
gcloud docker -- push gcr.io/google_containers/explorer:$(TAG) gcloud docker -- push k8s.gcr.io/explorer:$(TAG)
clean: clean:
rm -f explorer rm -f explorer

View File

@@ -5,7 +5,7 @@ metadata:
spec: spec:
containers: containers:
- name: explorer - name: explorer
image: gcr.io/google_containers/explorer:1.0 image: k8s.gcr.io/explorer:1.0
args: ["-port=8080"] args: ["-port=8080"]
ports: ports:
- containerPort: 8080 - containerPort: 8080

View File

@@ -15,9 +15,9 @@
# Build the guestbook-go example # Build the guestbook-go example
# Usage: # Usage:
# [VERSION=v3] [REGISTRY="gcr.io/google_containers"] make build # [VERSION=v3] [REGISTRY="k8s.gcr.io"] make build
VERSION?=v3 VERSION?=v3
REGISTRY?=gcr.io/google_containers REGISTRY?=k8s.gcr.io
release: clean build push clean release: clean build push clean

View File

@@ -22,7 +22,7 @@
"containers":[ "containers":[
{ {
"name":"guestbook", "name":"guestbook",
"image":"gcr.io/google_containers/guestbook:v3", "image":"k8s.gcr.io/guestbook:v3",
"ports":[ "ports":[
{ {
"name":"http-server", "name":"http-server",

View File

@@ -30,7 +30,7 @@ spec:
spec: spec:
containers: containers:
- name: master - name: master
image: gcr.io/google_containers/redis:e2e # or just image: redis image: k8s.gcr.io/redis:e2e # or just image: redis
resources: resources:
requests: requests:
cpu: 100m cpu: 100m

View File

@@ -17,7 +17,7 @@ spec:
spec: spec:
containers: containers:
- name: master - name: master
image: gcr.io/google_containers/redis:e2e # or just image: redis image: k8s.gcr.io/redis:e2e # or just image: redis
resources: resources:
requests: requests:
cpu: 100m cpu: 100m

View File

@@ -13,7 +13,7 @@ spec:
spec: spec:
containers: containers:
- name: master - name: master
image: gcr.io/google_containers/redis:e2e # or just image: redis image: k8s.gcr.io/redis:e2e # or just image: redis
resources: resources:
requests: requests:
cpu: 100m cpu: 100m

View File

@@ -37,11 +37,11 @@ tag: .tag
container: container:
$(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion)) $(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion))
docker build --pull -t gcr.io/google_containers/kubectl:$(TAG) . docker build --pull -t k8s.gcr.io/kubectl:$(TAG) .
push: container push: container
$(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion)) $(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion))
gcloud docker -- push gcr.io/google_containers/kubectl:$(TAG) gcloud docker -- push k8s.gcr.io/kubectl:$(TAG)
clean: clean:
rm -f kubectl rm -f kubectl

Some files were not shown because too many files have changed in this diff Show More